Extracting prog: 6m25.388782625s Minimizing prog: 1h15m47.140383701s Simplifying prog options: 0s Extracting C: 8m59.433367045s Simplifying C: 58m14.272865692s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0x6}, 0x18) program did not crash program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0x6}, 0x18) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h29m26.235439452s repro crashed as (corrupted=false): INFO: task kworker/1:1:47 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:47 tgid:47 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df921d84 r8:00000002 r7:60000013 r6:df921d8c r5:8381d400 r4:8381d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8381d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df921e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3ef80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8381d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c1078c r4:85c10400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c1078c r4:83848480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8381d400 r8:838484ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83848480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83848480 r8:80287e08 r7:df879e60 r6:83848500 r5:8381d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf921fb0 to 0xdf921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83844cc0 INFO: task kworker/1:1:47 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:5:3144 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:84326000 r4:84326000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84326000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84326000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85626b8c r4:85626800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85626b8c r4:845acb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84326000 r8:845acb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845acb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845acb00 r8:80287e08 r7:dfa4de60 r6:830b8480 r5:84326000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f5880 INFO: task kworker/0:5:3144 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:8:3149 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:84326c00 r4:84326c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84326c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850018c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84326c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8551538c r4:85515000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8551538c r4:845acc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84326c00 r8:845accac r7:82804d40 r6:dddced80 r5:dddceda0 r4:845acc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845acc80 r8:80287e08 r7:dfa69e60 r6:832f0380 r5:84326c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f5cc0 INFO: task kworker/0:8:3149 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:9:3151 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:83388000 r4:83388000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83388000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472d740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83388000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb97b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85640b8c r4:85640800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85640b8c r4:845acd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83388000 r8:845acd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845acd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845acd00 r8:80287e08 r7:dfa69e60 r6:845acd80 r5:83388000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f5ec0 INFO: task kworker/0:9:3151 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:10:3155 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:838e5400 r4:838e5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838e5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472dd40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85516f8c r4:85516c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85516f8c r4:845ace00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838e5400 r8:845ace2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845ace00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845ace00 r8:80287e08 r7:dfa41e60 r6:845ace80 r5:838e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4080 INFO: task kworker/0:10:3155 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:11:3156 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:838e6000 r4:838e6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838e6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85357e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb667000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495d78c r4:8495d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495d78c r4:845acf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838e6000 r8:845acf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845acf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845acf00 r8:80287e08 r7:dfa19e60 r6:845acf80 r5:838e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4080 INFO: task kworker/0:11:3156 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:12:3159 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:83b22400 r4:83b22400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b22400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fdf40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b22400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85720f8c r4:85720c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85720f8c r4:845ac580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b22400 r8:845ac5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:845ac580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845ac580 r8:80287e08 r7:dfaa1e60 r6:83d66f80 r5:83b22400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4200 INFO: task kworker/0:12:3159 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:13:3160 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:83b1bc00 r4:83b1bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85784340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495db8c r4:8495d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495db8c r4:83331800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1bc00 r8:8333182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83331800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83331800 r8:80287e08 r7:dfaa9e60 r6:83306080 r5:83b1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4340 INFO: task kworker/0:13:3160 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:14:3163 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:83b1a400 r4:83b1a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574638c r4:85746000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574638c r4:83306000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1a400 r8:8330602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83306000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83306000 r8:80287e08 r7:dfaa9e60 r6:8429f000 r5:83b1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4440 INFO: task kworker/0:14:3163 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:15:3164 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83b18c00 r4:83b18c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b18c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8574678c r4:85746400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8574678c r4:8429f080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b18c00 r8:8429f0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f080 r8:80287e08 r7:dfabde60 r6:8429f100 r5:83b18c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4440 INFO: task kworker/0:15:3164 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3166 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa85d84 r8:00000002 r7:60000113 r6:dfa85d8c r5:838f1800 r4:838f1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838f1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530e800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495eb8c r4:8495e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495eb8c r4:8429f180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838f1800 r8:8429f1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f180 r8:80287e08 r7:dfac9e60 r6:8429f200 r5:838f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4800 INFO: task kworker/0:16:3166 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3168 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:838f6c00 r4:838f6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838f6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f4800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb789000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c1f8c r4:858c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c1f8c r4:8429f280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838f6c00 r8:8429f2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f280 r8:80287e08 r7:dfa85e60 r6:8429f300 r5:838f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f49c0 INFO: task kworker/0:17:3168 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3170 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:84176c00 r4:84176c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84176c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2c2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84176c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c238c r4:858c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c238c r4:8429f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84176c00 r8:8429f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f380 r8:80287e08 r7:dfad1e60 r6:8429f400 r5:84176c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4b00 INFO: task kworker/0:18:3170 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3173 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84171800 r4:84171800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84171800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aaacc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84171800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec895000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c3b8c r4:858c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c3b8c r4:8429f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84171800 r8:8429f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f480 r8:80287e08 r7:dfae1e60 r6:8429f500 r5:84171800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f4cc0 INFO: task kworker/0:19:3173 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3175 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb01d84 r8:00000002 r7:60000013 r6:dfb01d8c r5:84172400 r4:84172400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84172400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84172400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495fb8c r4:8495f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495fb8c r4:8429f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84172400 r8:8429f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f580 r8:80287e08 r7:dfaede60 r6:8429f600 r5:84172400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f5200 INFO: task kworker/0:20:3175 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3176 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:84173c00 r4:84173c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84173c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842a9680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84173c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f4b8c r4:850f4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f4b8c r4:8429f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84173c00 r8:8429f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f680 r8:80287e08 r7:dfb01e60 r6:8429f700 r5:84173c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6080 INFO: task kworker/0:21:3176 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3179 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:84176000 r4:84176000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84176000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5f840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84176000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f578c r4:850f5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f578c r4:8429f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84176000 r8:8429f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f780 r8:80287e08 r7:dfaf5e60 r6:8429f800 r5:84176000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6300 INFO: task kworker/0:22:3179 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3180 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:84174800 r4:84174800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84174800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5d1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84174800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c14f8c r4:85c14c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c14f8c r4:8429f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84174800 r8:8429f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f880 r8:80287e08 r7:dfb09e60 r6:8429f900 r5:84174800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6300 INFO: task kworker/0:23:3180 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3182 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:84170000 r4:84170000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84170000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5fec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84170000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c2538c r4:85c25000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c2538c r4:8429f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84170000 r8:8429f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429f980 r8:80287e08 r7:dfb15e60 r6:8429fa00 r5:84170000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c63c0 INFO: task kworker/0:24:3182 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3184 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:83b14800 r4:83b14800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b14800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b14800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c2178c r4:85c21400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c2178c r4:8429fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b14800 r8:8429faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429fa80 r8:80287e08 r7:dfb1de60 r6:845ac780 r5:83b14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6740 INFO: task kworker/0:25:3184 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3186 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:83383000 r4:83383000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83383000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b9140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83383000 r7:00000000 r6:83018000 r5:00001000 r4:7f103000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f5f8c r4:850f5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f5f8c r4:8429fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83383000 r8:8429fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429fb00 r8:80287e08 r7:dfb1de60 r6:84255e80 r5:83383000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6600 INFO: task kworker/0:26:3186 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3189 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:83380000 r4:83380000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83380000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b0dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83380000 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed081000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f6f8c r4:850f6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f6f8c r4:8429fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83380000 r8:8429fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429fb80 r8:80287e08 r7:dfb39e60 r6:832c4e80 r5:83380000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c67c0 INFO: task kworker/0:27:3189 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3190 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:84320000 r4:84320000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84320000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84320000 r7:00000000 r6:83018000 r5:00001000 r4:7f107000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b35b8c r4:84b35800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b35b8c r4:8429fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84320000 r8:8429fc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429fc00 r8:80287e08 r7:dfb45e60 r6:832c4480 r5:84320000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6900 INFO: task kworker/0:28:3190 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3192 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83382400 r4:83382400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83382400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85356e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83382400 r7:00000000 r6:83018000 r5:00001000 r4:7f109000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cfe78c r4:85cfe400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cfe78c r4:8429fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83382400 r8:8429fcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429fc80 r8:80287e08 r7:dfb49e60 r6:832c4e00 r5:83382400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6a00 INFO: task kworker/0:29:3192 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3193 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:83381800 r4:83381800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83381800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83381800 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df961000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b35f8c r4:84b35c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b35f8c r4:8429fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83381800 r8:8429fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429fd00 r8:80287e08 r7:dfb51e60 r6:830cc300 r5:83381800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6a00 INFO: task kworker/0:30:3193 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3195 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:83aeec00 r4:83aeec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83aeec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f15c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83aeec00 r7:00000000 r6:83018000 r5:00001000 r4:7f247000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed61b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85baf78c r4:85baf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85baf78c r4:8429fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83aeec00 r8:8429fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429fe00 r8:80287e08 r7:dfb51e60 r6:830cc280 r5:83aeec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6b00 INFO: task kworker/0:31:3195 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3198 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:84323c00 r4:84323c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84323c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83aab4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84323c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b3738c r4:84b37000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3738c r4:8429fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84323c00 r8:8429feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429fe80 r8:80287e08 r7:dfb5de60 r6:830cc100 r5:84323c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6e00 INFO: task kworker/0:32:3198 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3199 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:83ae8000 r4:83ae8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ae8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e20c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ae8000 r7:00000000 r6:83018000 r5:00001000 r4:7f2d7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed52f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b36b8c r4:84b36800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b36b8c r4:8429ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ae8000 r8:8429ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429ff00 r8:80287e08 r7:dfb71e60 r6:830cc080 r5:83ae8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6e00 INFO: task kworker/0:33:3199 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3202 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:844d9800 r4:844d9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e2680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85baff8c r4:85bafc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85baff8c r4:8429ff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d9800 r8:8429ffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8429ff80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8429ff80 r8:80287e08 r7:dfb71e60 r6:830cc400 r5:844d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aab280 INFO: task kworker/0:34:3202 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3203 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb99d84 r8:00000002 r7:60000013 r6:dfb99d8c r5:844d8c00 r4:844d8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e2200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b3778c r4:84b37400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3778c r4:84462000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d8c00 r8:8446202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462000 r8:80287e08 r7:dfb8de60 r6:830cc380 r5:844d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aab3c0 INFO: task kworker/0:35:3203 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3205 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:844de000 r4:844de000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844de000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e2500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844de000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b37b8c r4:84b37800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b37b8c r4:84462080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844de000 r8:844620ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462080 r8:80287e08 r7:dfb8de60 r6:844bbc80 r5:844de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aab240 INFO: task kworker/0:36:3205 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:844dd400 r4:844dd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f1740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f357000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abc78c r4:84abc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abc78c r4:84462100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844dd400 r8:8446212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462100 r8:80287e08 r7:dfb8de60 r6:844bb080 r5:844dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aab3c0 INFO: task kworker/0:37:3208 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3210 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:844dbc00 r4:844dbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e2f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abc38c r4:84abc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abc38c r4:84462180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844dbc00 r8:844621ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462180 r8:80287e08 r7:dfbb1e60 r6:84814d80 r5:844dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aab580 INFO: task kworker/0:38:3210 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3213 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd5d84 r8:00000002 r7:60000113 r6:dfbd5d8c r5:844dec00 r4:844dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4d980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f36b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8678c r4:85d86400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d8678c r4:84462200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844dec00 r8:8446222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462200 r8:80287e08 r7:dfbb1e60 r6:84585000 r5:844dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aabb80 INFO: task kworker/0:39:3213 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3215 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:844db000 r4:844db000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844db000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844db000 r7:00000000 r6:83018000 r5:00001000 r4:7f36b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8578c r4:85d85400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d8578c r4:84462280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844db000 r8:844622ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462280 r8:80287e08 r7:dfbd5e60 r6:84585080 r5:844db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aabb80 INFO: task kworker/0:40:3215 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3216 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:844da400 r4:844da400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844da400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844da400 r7:00000000 r6:83018000 r5:00001000 r4:7f39b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed13b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d85f8c r4:85d85c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d85f8c r4:84462300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844da400 r8:8446232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462300 r8:80287e08 r7:dfbd5e60 r6:84585100 r5:844da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aabac0 INFO: task kworker/0:41:3216 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3218 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:844d8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d86b8c r4:85d86800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d86b8c r4:84462380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d8000 r8:844623ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462380 r8:80287e08 r7:dfbd5e60 r6:84585180 r5:844d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aabe40 INFO: task kworker/0:42:3218 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3221 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:83243c00 r4:83243c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ad3c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83243c00 r7:00000000 r6:83018000 r5:00001000 r4:7f63d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abe38c r4:84abe000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abe38c r4:84462400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83243c00 r8:8446242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462400 r8:80287e08 r7:dfbf5e60 r6:84585200 r5:83243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aabe00 INFO: task kworker/0:43:3221 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d86f8c r4:85d86c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84462480 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511d980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8325a400 r7:00000000 r6:83018000 r5:00001000 r4:7f4cf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed421000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8738c r4:85d87000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d8738c r4:84462500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8325a400 r8:8446252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462500 r8:80287e08 r7:dfc05e60 r6:84585300 r5:8325a400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:46 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84767300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f63b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed745000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abd78c r4:84abd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abd78c r4:84462580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83af3c00 r8:844625ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462580 r8:80287e08 r7:dfc05e60 r6:84585380 r5:83af3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472a080 INFO: task kworker/0:46:3226 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 r4:eb5f1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc39e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85c47f8c r4:84462600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3231 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:83cc3c00 r4:83cc3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83cc3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ad2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83cc3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f63b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abe78c r4:84abe400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abe78c r4:84462680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83cc3c00 r8:844626ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462680 r8:80287e08 r7:dfc05e60 r6:84585480 r5:83cc3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) r4:8472a240 r4:00000000 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 r4:00000000 r5:855df38c r4:855df000 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/0:49 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:83244800 r4:83244800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ad000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83244800 r7:00000000 r6:83018000 r5:00001000 r4:7f633000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abef8c r4:84abec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abef8c r4:84462700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83244800 r8:8446272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462700 r8:80287e08 r7:dfc51e60 r6:84585500 r5:83244800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472a400 INFO: task kworker/0:49:3234 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:84a40000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abeb8c r4:84abe800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84462780 r8:80287e08 r7:dfc65e60 r6:84585580 r5:84a40000 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84175400 r4:84175400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84175400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ad0c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84175400 r7:00000000 r6:83018000 r5:00001000 r4:7f637000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed865000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e1038c r4:85e10000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e1038c r4:84462800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84175400 r8:8446282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462800 r8:80287e08 r7:dfc65e60 r6:84462880 r5:84175400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472a4c0 INFO: task kworker/0:51:3236 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/0:52:3239 blocked for more than 451 seconds. r5:842ea400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e1ff80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfc61fb0 to 0xdfc61ff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e00f8c r4:85e00c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e00f8c r4:84462a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84860000 r8:84462a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462a00 r8:80287e08 r7:dfc61e60 r6:84462a80 r5:84860000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472a780 INFO: task kworker/0:53:3240 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3243 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84860c00 r4:84860c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84860c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e1fe80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abf78c r4:84abf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abf78c r4:84462b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84860c00 r8:84462b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462b00 r8:80287e08 r7:dfc61e60 r6:84462b80 r5:84860c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472aac0 INFO: task kworker/0:54:3243 is blocked on a mutex likely owned by task kworker/1:380:5038. r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:dfc91d84 r8:00000002 r7:60000113 r6:dfc91d8c r5:84861800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abff8c r4:84abfc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b53040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f5bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed979000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e00b8c r4:85e00800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e00b8c r4:84462d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84862400 r8:84462dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462d80 r8:80287e08 r7:dfc91e60 r6:84462e00 r5:84862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472af40 INFO: task kworker/0:56:3246 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/0:57:3249 blocked for more than 451 seconds. r4:84863000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84462d00 r8:80287e08 r7:dfc91e60 r6:84462e80 r5:84863000 r4:847670c0 Call trace: 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 r4:eb5f1dc0 r5:00001000 r4:ea9bb000 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3251 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcadd84 r8:00000002 r7:60000113 r6:dfcadd8c r5:84863c00 r4:84863c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84863c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ad5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f697000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abdb8c r4:84abd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abdb8c r4:84462f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84863c00 r8:84462f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84462f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84462f00 r8:80287e08 r7:dfc99e60 r6:84462f80 r5:84863c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847670c0 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84864800 r8:8476a02c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:84b75e80 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84766ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84865400 r7:00000000 r6:83018000 r5:00001000 r4:7f6e1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abcf8c r4:84abcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abcf8c r4:8476a100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84865400 r8:8476a12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8476a100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a100 r8:80287e08 r7:dfcb9e60 r6:8476a180 r5:84865400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc1fb0 to 0xdfcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847673c0 INFO: task kworker/0:60:3255 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3257 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfccdd84 r8:00000002 r7:60000113 r6:dfccdd8c r5:84866000 r4:84866000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84866000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:62:3259 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:84866c00 r4:84866c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84866c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84766d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84866c00 r7:00000000 r6:83018000 r5:00001000 r4:7f705000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc55000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b19f8c r4:84b19c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b19f8c r4:8476a300 r10:61c88647 r9:84866c00 r8:8476a32c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:63:3261 blocked for more than 451 seconds. r5:84908000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a33c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84908000 r8:8476a42c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858139c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84908c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e4f78c r4:85e4f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e4f78c r4:8476a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84908c00 r8:8476a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8476a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a500 r8:80287e08 r7:dfccde60 r6:8476a580 r5:84908c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847679c0 INFO: task kworker/0:64:3263 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3265 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:84909800 r4:84909800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84909800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e97b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84909800 r7:00000000 r6:83018000 r5:00001000 r4:7f87d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfe7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1b38c r4:84b1b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1b38c r4:8476a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84909800 r8:8476a62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8476a600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a600 r8:80287e08 r7:dfccde60 r6:8476a680 r5:84909800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 r4:eb5f1dc0 r5:00001000 r4:ea9bb000 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8490a400 r8:8476a72c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:67:3270 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:8490b000 r4:8490b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8490b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a3b100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8490b000 r7:00000000 r6:83018000 r5:00001000 r4:7f973000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1bf8c r4:84b1bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1bf8c r4:8476a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490b000 r8:8476a82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8476a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476a800 r8:80287e08 r7:df9fde60 r6:8476a880 r5:8490b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84767d40 INFO: task kworker/0:67:3270 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:8490bc00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1bb8c r4:84b1b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 r4:eb5f1dc0 r5:00001000 r4:ea9bb000 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85ec338c r4:8476aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8490c800 r8:8476aa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8476aa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476aa00 r8:80287e08 r7:dfa45e60 r6:8476aa80 r5:8490c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8477f080 INFO: task kworker/0:69:3272 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8c7df000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3276 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3276 tgid:3276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:8490d400 r4:8490d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8490d400 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edb3b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b18b8c r4:84b18800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8476ab00 Exception stack(0xdfaddfb0 to 0xdfaddff8) r4:8477f200 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:8490e000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b18f8c r4:84b18c00 r10:61c88647 r9:8490e000 r8:8476ac2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8e93d000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:72:3280 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:72 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcd9d84 r8:00000002 r7:60000113 r6:dfcd9d8c r5:8490ec00 r4:8490ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8490ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1878c r4:84b18400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8476ad00 r8:80287e08 r7:dfcd5e60 r6:8476ad80 r5:8490ec00 r4:8477f440 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r5:800f0013 r4:80239bb0 r4:eb5f1dc0 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:84af0000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84af0000 r7:00000000 r6:83018000 r5:00001000 r4:7fa45000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482d38c r4:8482d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8482d38c r4:8476ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84af0000 r8:8476ae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8476ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ae00 r8:80287e08 r7:dfcd9e60 r6:8476ae80 r5:84af0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8477f440 INFO: task kworker/0:73:3281 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8f05b000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:74:3284 blocked for more than 451 seconds. r5:84af0c00 r4:8291a680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482d78c r4:8482d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8482d78c r4:8476af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84af0c00 r8:8476af2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8476af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476af00 r8:80287e08 r7:dfcdde60 r6:8476af80 r5:84af0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8477f840 INFO: task kworker/0:74:3284 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8f05b000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) r4:84b75e80 Workqueue: events bpf_prog_free_deferred r5:84a41800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a41800 r7:00000000 r6:83018000 r5:00001000 r4:7fabf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee3d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482db8c r4:8482d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8482db8c r4:8478d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a41800 r8:8478d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d000 r8:80287e08 r7:dfce1e60 r6:84585600 r5:84a41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8477f900 INFO: task kworker/0:75:3285 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8f79a000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8478d080 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8477fb00 INFO: task kworker/0:76:3288 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8f79a000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:3289 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f2b78c r4:85f2b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85f2b78c r4:8478d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a43c00 r8:8478d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d100 r8:80287e08 r7:dfcf9e60 r6:84585700 r5:84a43c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcfdfb0 to 0xdfcfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8477fb00 INFO: task kworker/0:77:3289 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 8fd88000 e0041000 00000001 80239b98 7f35f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 INFO: task kworker/0:78:3292 blocked for more than 451 seconds. r4:84a45400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b55d00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482e78c r4:8482e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8478d180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 8fd88000 e0041000 00000001 80239b98 7f35f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:81 state:D stack:0 pid:3296 tgid:3296 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a44800 r8:8478d32c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 9042b000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:3302 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfce5d84 r8:00000002 r7:60000113 r6:dfce5d8c r5:84af1800 r4:84af1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84af1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e5040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84af1800 r7:00000000 r6:83018000 r5:00001000 r4:7fd19000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeaaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482f38c r4:8482f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8482f38c r4:8478d480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84af1800 r8:8478d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478d480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d480 r8:80287e08 r7:dfd19e60 r6:8478d500 r5:84af1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce5fb0 to 0xdfce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84af2400 r8:8478d5ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 90b56000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:3307 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:3307 tgid:3307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd31d84 r8:00000002 r7:60000113 r6:dfd31d8c r5:84af3000 r4:84af3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84af3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a2f3c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84af3000 r7:00000000 r6:83018000 r5:00001000 r4:7fc91000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee793000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85fab78c r4:85fab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfd31fb0 to 0xdfd31ff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:eb5f1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r5:84af3c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ee499000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85faef8c r4:8478d780 r10:00000000 r9:8478d780 r8:80287e08 r7:dfd31e60 r6:8478d800 r5:84af3c00 r4:84795600 Call trace: 1d20: 9163e000 e0041000 00000001 80239b98 7f35f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:88:3310 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:3310 tgid:3310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:84af4800 r4:84af4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84af4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84af4800 r7:00000000 r6:83018000 r5:00001000 r4:7fd17000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eeaa9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482f78c r4:8482f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8482f78c r4:8478d880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84af4800 r8:8478d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478d880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d880 r8:80287e08 r7:dfca5e60 r6:8478d900 r5:84af4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84795a00 INFO: task kworker/0:88:3310 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 91745000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:91 state:D stack:0 pid:3317 tgid:3317 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482df8c r4:8482dc00 r10:61c88647 r9:848c0c00 r8:8478db2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xdfd75fb0 to 0xdfd75ff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848c3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ad500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7fd8d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482e38c r4:8482e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8482e38c r4:8478db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3c00 r8:8478dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478db80 r8:80287e08 r7:dfd75e60 r6:84585b80 r5:848c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd95fb0 to 0xdfd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ad080 INFO: task kworker/0:92:3320 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 91d00000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:93:3322 blocked for more than 451 seconds. Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ad0c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848c5400 r7:00000000 r6:83018000 r5:00001000 r4:7fd85000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee66f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482eb8c r4:8482e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8482eb8c r4:8478dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c5400 r8:8478dc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8478dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478dc00 r8:80287e08 r7:dfd95e60 r6:84585c00 r5:848c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd9dfb0 to 0xdfd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ad080 INFO: task kworker/0:93:3322 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: 92335000 e0041000 00000001 80239b98 7f35f000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482ef8c r4:8482ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 92335000 e0041000 00000001 80239b98 7f35f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:4928 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:84ad2400 r4:84ad2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b50580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad2400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8551678c r4:85516400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8551678c r4:85104900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad2400 r8:8510492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85104900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85104900 r8:80287e08 r7:eb3b9e60 r6:85104980 r5:84ad2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df540 INFO: task kworker/0:572:4928 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 92335000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r5:00001000 r4:ea9bb000 r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:855e6000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eabe3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85104c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85104c00 r8:80287e08 r7:eb469e60 r6:850d7e00 r5:855e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85077180 INFO: task kworker/0:574:4944 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 92866000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:5042 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:5042 tgid:5042 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa13000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df78c r4:855df400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b7fb80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/1:383:5044 blocked for more than 451 seconds. r4:85614800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r5:00001000 r4:eadb3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:5047 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb605d84 r8:00000002 r7:60000113 r6:eb605d8c r5:85613000 r4:85613000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85613000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb605e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85001a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85515b8c r4:85515800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85515b8c r4:84b7fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85613000 r8:84b7fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7fd80 r8:80287e08 r7:eb5fde60 r6:84b7fe00 r5:85613000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb605fb0 to 0xeb605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b77400 INFO: task kworker/1:384:5047 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 92e60000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:85589800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85589800 r8:84b7feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:5051 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:5051 tgid:5051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb609d84 r8:00000002 r7:60000113 r6:eb609d8c r5:8558bc00 r4:8558bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b77a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855dff8c r4:855dfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855dff8c r4:84b7ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558bc00 r8:84b7ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7ff00 r8:80287e08 r7:eb5fde60 r6:85104f00 r5:8558bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b77980 INFO: task kworker/1:386:5051 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 93765000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:5052 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:8558c800 r4:8558c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85515f8c r4:85515c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85104f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 93765000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:5054 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:8558e000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561c78c r4:8561c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561c78c r4:84b7ff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85588000 r8:84b7a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a000 r8:80287e08 r7:eb615e60 r6:84b71100 r5:85588000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b77cc0 INFO: task kworker/1:388:5056 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 93c1c000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b75e80 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae6d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561d38c r4:8561d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b7a080 r8:80287e08 r7:eb61de60 r6:84b71180 r5:8558a400 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:5059 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:8558d400 r4:8558d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b75b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558d400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561cf8c r4:8561cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561cf8c r4:84b7a100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558d400 r8:84b7a12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a100 r8:80287e08 r7:eb621e60 r6:84b71200 r5:8558d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b77dc0 INFO: task kworker/1:390:5059 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:85588c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561d78c r4:8561d400 r10:61c88647 r9:85588c00 r8:84b7a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeb5f1d28 to 0xeb5f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b614c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561e38c r4:8561e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561e38c r4:84b7a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558ec00 r8:84b7a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a200 r8:80287e08 r7:eb62de60 r6:84b71300 r5:8558ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75dc0 INFO: task kworker/1:392:5063 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 9484e000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc6-syzkaller #0 r4:8558b000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb00d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ea9bb000 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:855e3000 r5:855e3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb029000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561df8c r4:8561dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561df8c r4:84b7a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e3000 r8:84b7a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a300 r8:80287e08 r7:eb631e60 r6:84b71400 r5:855e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61100 INFO: task kworker/1:394:5067 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 9484e000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b615c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeb5f1d28 to 0xeb5f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:5072 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:5072 tgid:5072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:85615400 r4:85615400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85615400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85615400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561ef8c r4:8561ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561ef8c r4:84b7a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85615400 r8:84b7a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a480 r8:80287e08 r7:eb639e60 r6:84b7a500 r5:85615400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b61540 Call trace: 1d20: 95127000 e0041000 00000001 80239b98 7f35f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84b7a580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561f78c r4:8561f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561f78c r4:84b7a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bca400 r8:84b7a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a680 r8:80287e08 r7:eb645e60 r6:84b71480 r5:84bca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61900 INFO: task kworker/1:398:5075 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 95127000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:5078 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:85590000 r4:85590000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85590000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b60500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85590000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561f38c r4:8561f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561f38c r4:84b71500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85590000 r8:84b7152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b71500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b71500 r8:80287e08 r7:eb469e60 r6:84b71580 r5:85590000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b603c0 INFO: task kworker/0:576:5078 is blocked on a mutex likely owned by task kworker/1:380:5038. Call trace: r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 95631000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:5080 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb64dd84 r8:00000002 r7:60000113 r6:eb64dd8c r5:85590c00 r4:85590c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85590c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b607c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85590c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8551638c r4:85516000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8551638c r4:84b71600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85590c00 r8:84b7162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b71600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b71600 r8:80287e08 r7:eb469e60 r6:84b71680 r5:85590c00 r4:00000001 Exception stack(0xeb64dfb0 to 0xeb64dff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r5:855df38c r4:855df000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85591800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb293000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561fb8c r4:8561f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8561fb8c r4:84b7a700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85591800 r8:84b7a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a700 r8:80287e08 r7:eb649e60 r6:84b71700 r5:85591800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61d80 INFO: task kworker/1:399:5082 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 95bc3000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:5083 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb659d84 r8:00000002 r7:60000113 r6:eb659d8c r5:85592400 r4:85592400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85592400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562438c r4:85624000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562438c r4:84b7a780 r10:61c88647 r9:85592400 r8:84b7a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r5:800f0013 r4:80239bb0 r4:eb5f1dc0 r5:00001000 r4:ea9bb000 r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/1:401:5085 blocked for more than 452 seconds. r5:85593c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561ff8c r4:8561fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ea9bb000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000013 r6:eb66dd8c r5:85594800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb2fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562478c r4:85624400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562478c r4:84b7a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85594800 r8:84b7a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a880 r8:80287e08 r7:eb659e60 r6:84b71880 r5:85594800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85001380 INFO: task kworker/1:402:5088 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 96239000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:5090 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb675d84 r8:00000002 r7:60000013 r6:eb675d8c r5:85596000 r4:85596000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85596000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb675e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5b380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85596000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb441000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562578c r4:85625400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85596000 r8:84b7a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: 1d20: 96239000 e0041000 00000001 80239b98 7f35f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:5091 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:85593000 r4:85593000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85593000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b778c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85593000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85624b8c r4:85624800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85624b8c r4:84b7a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85593000 r8:84b7a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7a980 r8:80287e08 r7:eb675e60 r6:84b71980 r5:85593000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85001380 INFO: task kworker/1:404:5091 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: Exception stack(0xeb5f1d28 to 0xeb5f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85624f8c r4:85624c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ea9bb000 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:84bf1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5b180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bf1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562538c r4:85625000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562538c r4:84b7aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf1800 r8:84b7aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7aa80 r8:80287e08 r7:eb675e60 r6:84b71a80 r5:84bf1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b5b2c0 INFO: task kworker/1:406:5095 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 96a90000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85625b8c r4:85625800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb68dfb0 to 0xeb68dff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:5101 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb695d84 r8:00000002 r7:60000113 r6:eb695d8c r5:84bf4800 r4:84bf4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499c8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bf4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb589000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85517b8c r4:85517800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85517b8c r4:84b71b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf4800 r8:84b71bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b71b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b71b80 r8:80287e08 r7:eb469e60 r6:84b71c00 r5:84bf4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b60f80 INFO: task kworker/0:578:5101 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 96fad000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b772c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855df38c r4:855df000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855df38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:5102 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:5102 tgid:5102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb699d84 r8:00000002 r7:60000013 r6:eb699d8c r5:84bf2400 r4:84bf2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5bd80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bf2400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562738c r4:85627000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562738c r4:84b7ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf2400 r8:84b7abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7ab80 r8:80287e08 r7:eb68de60 r6:84b71c80 r5:84bf2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b5b4c0 INFO: task kworker/1:408:5102 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 96fad000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r5:855df38c r4:855df000 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:84b75e80 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb459000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eb5f1dc0 r5:00001000 r4:ea9bb000 r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:84bf6c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb479000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84b7ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7ac80 r8:80287e08 r7:eb699e60 r6:84b71d80 r5:84bf6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b5b440 INFO: task kworker/1:410:5105 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: 9770f000 e0041000 00000001 80239b98 7f35f000 00000001 1d40: 82ac15a0 7f35f000 e0041000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac2 <> from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b45400 r8:8488d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488d580 r8:80287e08 r7:ed071e60 r6:8488d600 r5:85b45400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed08dfb0 to 0xed08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513fac0 INFO: task kworker/1:974:6569 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:975:6570 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:975 state:D stack:0 pid:6570 tgid:6570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed095d84 r8:00000002 r7:60000013 r6:ed095d8c r5:85b46000 r4:85b46000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b46000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed095e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513fc40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b46000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed097000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbff8c r4:85bbfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbff8c r4:8488d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b46000 r8:8488d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488d680 r8:80287e08 r7:ed08de60 r6:8488d700 r5:85b46000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed095fb0 to 0xed095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:85b46c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecff5e08 r9:83018205 r8:85b46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 r7:ddde2d80 r6:83018200 r5:85bf878c r4:8488d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8488d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488d780 r8:80287e08 r7:ed08de60 r6:8488d800 r5:85b46c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecff5fb0 to 0xecff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8513ffc0 INFO: task kworker/1:976:6571 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: ada1d000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/1:977:6574 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0a1d84 r8:00000002 r7:60000113 r6:ed0a1d8c r5:85b44800 r4:85b44800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b44800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b44800 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf8b8c r4:85bf8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bf8b8c r4:8488d880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b44800 r8:8488d8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488d880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xed0a1fb0 to 0xed0a1ff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:978 state:D stack:0 pid:6576 tgid:6576 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85bf8f8c r4:8488d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed0b5fb0 to 0xed0b5ff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:85d4c38c r4:85d4c000 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed0bdd84 r8:00000002 r7:60000013 r6:ed0bdd8c r5:85b42400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ed0d3000 r7:ddde2d80 r6:83018200 r5:85bf978c r4:8488da80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b42400 r8:8488daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488da80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488da80 r8:80287e08 r7:ed0b5e60 r6:8488db00 r5:85b42400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0bdfb0 to 0xed0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510a100 INFO: task kworker/1:979:6578 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: adf00000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:980:6579 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:980 state:D stack:0 pid:6579 tgid:6579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0a9d84 r8:00000002 r7:60000113 r6:ed0a9d8c r5:85b40000 r4:85b40000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b40000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85bf938c r4:8488db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r5:85d4c38c r4:85d4c000 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:84b75e80 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0f9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf9b8c r4:85bf9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bf9b8c r4:8488dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b40c00 r8:8488dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488dc80 r8:80287e08 r7:ed0bde60 r6:8488dd00 r5:85b40c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0c9fb0 to 0xed0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510a4c0 INFO: task kworker/1:981:6582 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: ae2e1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:6584 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85b48000 r7:00000000 r6:83018000 r5:00001000 r4:7f103000 r7:dddced80 r6:83018000 r5:850f538c r4:850dc580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:850dc580 r8:80287e08 r7:ecfb5e60 r6:8488dd80 r5:85b48000 r4:850fe8c0 Workqueue: events bpf_prog_free_deferred 1d20: ae694000 ea9bd000 00000001 80239b98 7f361000 00000001 r4:eb5f1dc0 r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed0f1d84 r8:00000002 r7:60000013 r6:ed0f1d8c r5:85b48c00 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85bfb78c r4:8488de00 r10:00000000 r9:8488de00 r8:80287e08 r7:ed0c9e60 r6:8488de80 r5:85b48c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: ae694000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:983:6587 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:983 state:D stack:0 pid:6587 tgid:6587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0e5d84 r8:00000002 r7:60000113 r6:ed0e5d8c r5:85b49800 r4:85b49800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b49800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510a780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b49800 r7:00000000 r6:83018200 r5:00001000 r4:7f0fb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf9f8c r4:85bf9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bf9f8c r4:8488df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b49800 r8:8488df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488df00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488df00 r8:80287e08 r7:ed0f1e60 r6:8488df80 r5:85b49800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r4:00000000 r5:00001000 r4:ed1ef000 r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/1:984:6588 blocked for more than 466 seconds. r5:85b4a400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85bfa38c r4:8514b000 r10:61c88647 r9:85b4a400 r8:8514b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r4:00000000 r5:00001000 r4:ed1ef000 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:985 state:D stack:0 pid:6591 tgid:6591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed111d84 r8:00000002 r7:60000113 r6:ed111d8c r5:85bc8000 r4:85bc8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bc8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed111e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510abc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ff000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bfa78c r4:85bfa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bfa78c r4:8514b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc8000 r8:8514b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b100 r8:80287e08 r7:ed0f1e60 r6:850dc600 r5:85bc8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510ab00 INFO: task kworker/1:985:6591 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: aecac000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:986:6592 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:986 state:D stack:0 pid:6592 tgid:6592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed115d84 r8:00000002 r7:60000013 r6:ed115d8c r5:85bc8c00 r4:85bc8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bc8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed115e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8510acc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f101000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed105000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bfab8c r4:85bfa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bfab8c r4:8514b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc8c00 r8:8514b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b180 r8:80287e08 r7:ed0f1e60 r6:850dc680 r5:85bc8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed115fb0 to 0xed115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510ac40 INFO: task kworker/1:986:6592 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85bca400 r7:00000000 r6:83018200 r5:00001000 r4:7f105000 r7:ddde2d80 r6:83018200 r5:85bfaf8c r4:8514b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8514b200 r8:80287e08 r7:ed0f1e60 r6:850dc700 r5:85bca400 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:988:6597 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:6597 tgid:6597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0f5d84 r8:00000002 r7:60000013 r6:ed0f5d8c r5:85bcb000 r4:85bcb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bcb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ac040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bcb000 r7:00000000 r6:83018200 r5:00001000 r4:7f107000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed127000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bfb38c r4:85bfb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bfb38c r4:8514b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bcb000 r8:8514b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b280 r8:80287e08 r7:ed0f1e60 r6:850dc780 r5:85bcb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f5fb0 to 0xed0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8510ac40 INFO: task kworker/1:988:6597 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) r4:84b75e80 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85bfbf8c r4:8514b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8514b300 r8:80287e08 r7:ed0f1e60 r6:850dc800 r5:85bcbc00 r4:851ac180 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:6601 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:990 state:D stack:0 pid:6601 tgid:6601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece5dd84 r8:00000002 r7:60000113 r6:ece5dd8c r5:85bcc800 r4:85bcc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bcc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ac340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bcc800 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb457000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bfbb8c r4:85bfb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bfbb8c r4:8514b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bcc800 r8:8514b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b380 r8:80287e08 r7:ece49e60 r6:850dc880 r5:85bcc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece5dfb0 to 0xece5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ac080 INFO: task kworker/1:990:6601 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: af56d000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c0438c r4:8514b400 r10:61c88647 r9:85bcd400 r8:8514b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xece6dfb0 to 0xece6dff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/1:992:6606 blocked for more than 466 seconds. r4:85bce000 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ac980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bce000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebfbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c04f8c r4:85c04c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c04f8c r4:8514b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bce000 r8:8514b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b480 r8:80287e08 r7:ece6de60 r6:850dc980 r5:85bce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece89fb0 to 0xece89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ac480 INFO: task kworker/1:992:6606 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: af9b0000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:993:6607 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:993 state:D stack:0 pid:6607 tgid:6607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece95d84 r8:00000002 r7:60000013 r6:ece95d8c r5:85bcec00 r4:85bcec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bcec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ac680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bcec00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0478c r4:85c04400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0478c r4:8514b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bcec00 r8:8514b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b500 r8:80287e08 r7:ece89e60 r6:850dca00 r5:85bcec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece95fb0 to 0xece95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ac480 INFO: task kworker/1:993:6607 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: af9b0000 ea9bd000 00000001 80239b98 7f361000 00000001 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ac800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bc9800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf2d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c04b8c r4:85c04800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c04b8c r4:8514b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bc9800 r8:8514b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b580 r8:80287e08 r7:ece89e60 r6:850dca80 r5:85bc9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed131fb0 to 0xed131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ac780 INFO: task kworker/1:994:6610 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: afce4000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c0578c r4:8514b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85496c00 r8:8514b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/1:996:6613 blocked for more than 466 seconds. r4:854a0000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0538c r4:8514b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a0000 r8:8514b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b680 r8:80287e08 r7:ed135e60 r6:850dcb80 r5:854a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed139fb0 to 0xed139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ac8c0 INFO: task kworker/1:996:6613 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: afe50000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:997:6617 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:6617 tgid:6617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:854a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r7:ddde2d80 r6:83018200 r5:85c0638c r4:8514b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8514b700 r8:80287e08 r7:ed135e60 r6:850dcc00 r5:854a3000 r4:851ac8c0 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:998:6618 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:998 state:D stack:0 pid:6618 tgid:6618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed14dd84 r8:00000002 r7:60000013 r6:ed14dd8c r5:854a0c00 r4:854a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed14de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851acc00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c05b8c r4:85c05800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c05b8c r4:8514b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a0c00 r8:8514b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b780 r8:80287e08 r7:ed149e60 r6:850dcc80 r5:854a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed14dfb0 to 0xed14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ac8c0 INFO: task kworker/1:998:6618 is blocked on a mutex likely owned by task kworker/1:380:5038. Exception stack(0xeb5f1d28 to 0xeb5f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r5:00001000 r4:ed1ef000 r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r7:ddde2d80 r6:83018200 r5:85c05f8c r4:8514b800 r10:61c88647 r9:85b4b000 r8:8514b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1000:6621 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1000 state:D stack:0 pid:6621 tgid:6621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed145d84 r8:00000002 r7:60000013 r6:ed145d8c r5:85b4d400 r4:85b4d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b4d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed145e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ab040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c06b8c r4:85c06800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c06b8c r4:8514b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b4d400 r8:8514b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514b900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514b900 r8:80287e08 r7:ed149e60 r6:8514b980 r5:85b4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed145fb0 to 0xed145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842a9d00 INFO: task kworker/1:1000:6621 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 r5:85d4c38c r4:85d4c000 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:1001:6624 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r4:85b4e000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0678c r4:85c06400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0678c r4:8514ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b4e000 r8:8514ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514ba00 r8:80287e08 r7:ed145e60 r6:8514ba80 r5:85b4e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed151fb0 to 0xed151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ace80 INFO: task kworker/1:1001:6624 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b0663000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1002:6625 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1002 state:D stack:0 pid:6625 tgid:6625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85b4ec00 r4:8291a680 r4:00000000 r4:00000000 r5:85c06f8c r4:85c06c00 r7:ddde2d80 r6:83018200 r5:85c06f8c r4:8514bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b4ec00 r8:8514bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) r4:84b75e80 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c0738c r4:8514bc00 r10:61c88647 r9:85b4c800 r8:8514bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1004:6630 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1004 state:D stack:0 pid:6630 tgid:6630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed161d84 r8:00000002 r7:60000013 r6:ed161d8c r5:85b4bc00 r4:85b4bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b4bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed161e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ab580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b4bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c07b8c r4:85c07800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c07b8c r4:8514bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b4bc00 r8:8514bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514bd00 r8:80287e08 r7:ed159e60 r6:8514bd80 r5:85b4bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed161fb0 to 0xed161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842ab240 INFO: task kworker/1:1004:6630 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b144b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:1005 state:D stack:0 pid:6632 tgid:6632 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed165e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c0778c r4:8514be00 r4:8514be00 r10:00000000 r9:8514be00 r8:80287e08 r7:ed161e60 r6:8514be80 r5:85b50000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed165fb0 to 0xed165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842ab340 INFO: task kworker/1:1005:6632 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b144b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1006:6635 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1006 state:D stack:0 pid:6635 tgid:6635 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85b50c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed16de08 r5:00001000 r4:ecc73000 r7:ddde2d80 r6:83018200 r5:85c07f8c r4:8514bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b50c00 r8:8514bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b144b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r5:85b51800 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:85c0c38c r4:85c37000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b51800 r8:85c3702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37000 r10:00000000 r9:85c37000 r8:80287e08 r7:ed16de60 r6:85c37080 r5:85b51800 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed171d84 r8:00000002 r7:60000013 r6:ed171d8c r5:85b52400 r4:85b52400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b52400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed171e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842aba00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b52400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0c78c r4:85c0c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0c78c r4:85c37100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b52400 r8:85c3712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c37100 r8:80287e08 r7:ed15de60 r6:85c37180 r5:85b52400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed171fb0 to 0xed171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842abb40 INFO: task kworker/1:1008:6638 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b1d3b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:1009 state:D stack:0 pid:6640 tgid:6640 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c0cb8c r4:85c37200 r4:85c37200 Exception stack(0xed175fb0 to 0xed175ff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b2061000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1010:6643 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1010 state:D stack:0 pid:6643 tgid:6643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85c0cf8c r4:85c37300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b53c00 r8:85c3732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85b54800 r4:8291a680 r4:00000000 r4:00000000 r5:85c0d38c r4:85c0d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0d38c r4:85c37400 r4:85c37400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r5:800f0013 r4:80239bb0 r4:eb5f1dc0 r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1012:6646 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1012 state:D stack:0 pid:6646 tgid:6646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed185d84 r8:00000002 r7:60000013 r6:ed185d8c r5:854a2400 r4:854a2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed185e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3e380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0db8c r4:85c0d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0db8c r4:85c37500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a2400 r8:85c3752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c37500 r8:80287e08 r7:ed17de60 r6:850dcd00 r5:854a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed185fb0 to 0xed185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c3e100 INFO: task kworker/1:1012:6646 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b241c000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1013:6648 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1013 state:D stack:0 pid:6648 tgid:6648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed189d84 r8:00000002 r7:60000013 r6:ed189d8c r5:854a3c00 r4:854a3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed189e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3e200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccfd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0d78c r4:85c0d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0d78c r4:85c37580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a3c00 r8:85c375ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c37580 r8:80287e08 r7:ed185e60 r6:850dcd80 r5:854a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed189fb0 to 0xed189ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r5:85d4c38c r4:85d4c000 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:84b75e80 INFO: task kworker/1:1014:6649 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1014 state:D stack:0 pid:6649 tgid:6649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed18dd84 r8:00000002 r7:60000113 r6:ed18dd8c r5:854a4800 r4:854a4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed18de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3e480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0df8c r4:85c0dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0df8c r4:85c37600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a4800 r8:85c3762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c37600 r8:80287e08 r7:ed185e60 r6:850dce00 r5:854a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed18dfb0 to 0xed18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c3e1c0 INFO: task kworker/1:1014:6649 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b2931000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/1:1015:6653 blocked for more than 467 seconds. r4:854a5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed19de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85c0e38c r4:85c0e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854a5400 r8:85c376ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3e940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecec3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0ef8c r4:85c0ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0ef8c r4:85c37700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a6000 r8:85c3772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c37700 r8:80287e08 r7:ed19de60 r6:850dcf00 r5:854a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a5fb0 to 0xed1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c3e500 INFO: task kworker/1:1016:6655 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b2dd1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 INFO: task kworker/1:1017:6656 blocked for more than 467 seconds. r5:85be0000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0e78c r4:85c0e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1018:6657 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1018 state:D stack:0 pid:6657 tgid:6657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1add84 r8:00000002 r7:60000113 r6:ed1add8c r5:85be0c00 r4:85be0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3e880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0eb8c r4:85c0e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0eb8c r4:85c37800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be0c00 r8:85c3782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c37800 r8:80287e08 r7:ed1a5e60 r6:85c4b000 r5:85be0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1adfb0 to 0xed1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85c3e600 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r4:eb5f1dc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:84b75e80 task:kworker/1:1019 state:D stack:0 pid:6659 tgid:6659 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0ff8c r4:85c0fc00 r7:ddde2d80 r6:83018200 r5:85c0ff8c r4:85c37880 r4:00000001 r4:85c3e840 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 r4:00000000 r5:85d4c38c r4:85d4c000 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1020:6661 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1020 state:D stack:0 pid:6661 tgid:6661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1bdd84 r8:00000002 r7:60000013 r6:ed1bdd8c r5:85be1800 r4:85be1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c3eb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecef5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c0f38c r4:85c0f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0f38c r4:85c37900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be1800 r8:85c3792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85c37900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c37900 r8:80287e08 r7:ed1b5e60 r6:85c4b100 r5:85be1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1bdfb0 to 0xed1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c3ebc0 INFO: task kworker/1:1020:6661 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b396b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 r4:00000001 r4:84b75e80 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85be3000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r5:85c0f78c r4:85c0f400 r7:ddde2d80 r6:83018200 r5:85c0f78c r4:85c37980 r10:00000000 r9:85c37980 r8:80287e08 r7:ed1b5e60 r6:85c4b180 r5:85be3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c5fb0 to 0xed1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c3ea40 INFO: task kworker/1:1021:6663 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b3c62000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1022:6665 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1022 state:D stack:0 pid:6665 tgid:6665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1cdd84 r8:00000002 r7:60000113 r6:ed1cdd8c r5:85be3c00 r4:85be3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85be3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 r5:85c0fb8c r4:85c0f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c0fb8c r4:85c37a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed1cdfb0 to 0xed1cdff8) task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ed1d5d84 r8:00000002 r7:60000013 r6:ed1d5d8c r5:85be4800 r4:00000000 r4:00000000 r5:85c1038c r4:85c10000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85be4800 r8:85c37aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:eb5f1dc0 r5:00001000 r4:ed1ef000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed261d84 r8:00000002 r7:60000113 r6:ed261d8c r5:854a6c00 r4:854a6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed261e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b0280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f109000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f678c r4:850f6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f678c r4:85c4b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a6c00 r8:85c4b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c4b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c4b400 r8:80287e08 r7:ecfb5e60 r6:85c4b480 r5:854a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed261fb0 to 0xed261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed241d84 r8:00000002 r7:60000113 r6:ed241d8c r5:854a1800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b0000 r5:850f638c r4:850f6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85c4b500 r8:80287e08 r7:ed261e60 r6:85c4b580 r5:854a1800 r4:85c5f680 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b44c8000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) r4:84b75e80 Workqueue: events bpf_prog_free_deferred r5:85573000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b0040 r5:85c2cb8c r4:85c2c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c2cb8c r4:85c4b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85573000 r8:85c4b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c4b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c4b600 r8:80287e08 r7:ed261e60 r6:85c4b680 r5:85573000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a1fb0 to 0xed2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848b00c0 INFO: task kworker/0:740:6791 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b44c8000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:84b75e80 Workqueue: events bpf_prog_free_deferred r5:85573c00 r4:8291a680 r4:00000000 r4:00000000 r5:850f738c r4:850f7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f738c r4:85c4b700 r10:61c88647 r9:85573c00 r8:85c4b72c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:742 state:D stack:0 pid:6795 tgid:6795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2fdd84 r8:00000002 r7:60000113 r6:ed2fdd8c r5:85574800 r4:85574800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85574800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b0340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85574800 r7:00000000 r6:83018000 r5:00001000 r4:7f10b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f6b8c r4:850f6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f6b8c r4:85c4b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85574800 r8:85c4b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c4b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c4b800 r8:80287e08 r7:ed2f9e60 r6:85c4b880 r5:85574800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2fdfb0 to 0xed2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848b0380 INFO: task kworker/0:742:6795 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b48ad000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 INFO: task kworker/0:743:6801 blocked for more than 467 seconds. r4:85576c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed311e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850f778c r4:850f7400 r7:dddced80 r6:83018000 r5:850f778c r4:85c4b900 r10:00000000 r9:85c4b900 r8:80287e08 r7:ed2f9e60 r6:85c4b980 r5:85576c00 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85b55400 r4:8291a680 r4:00000000 r4:00000000 r5:850f7f8c r4:850f7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b55400 r8:85c4ba2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b511b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:745:6830 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:745 state:D stack:0 pid:6830 tgid:6830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed359d84 r8:00000002 r7:60000113 r6:ed359d8c r5:85c90000 r4:85c90000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c90000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed359e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848b0980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c90000 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed13f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f7b8c r4:850f7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850f7b8c r4:85c4ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c90000 r8:85c4baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c4ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c4ba80 r8:80287e08 r7:ed355e60 r6:85c37c80 r5:85c90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed359fb0 to 0xed359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84b34f8c r4:84b34c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b511b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:6839 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:6839 tgid:6839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed365d84 r8:00000002 r7:60000113 r6:ed365d8c r5:85c90c00 r4:85c90c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c90c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed365e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f109000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b3578c r4:84b35400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3578c r4:85c4bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c90c00 r8:85c4bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c4bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c4bb80 r8:80287e08 r7:ed361e60 r6:85c37d80 r5:85c90c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed365fb0 to 0xed365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8459cec0 INFO: task kworker/0:747:6839 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b552f000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85c93c00 r4:8291a680 r4:00000000 r4:00000000 r5:84b3538c r4:84b35000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3538c r4:85c4bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c93c00 r8:85c4bc2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:ed1ef000 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cc700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85576000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed371000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cf4f8c r4:85cf4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85cf4f8c r4:85c4bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85576000 r8:85c4bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c4bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c4bc80 r8:80287e08 r7:ed361e60 r6:85c4bd00 r5:85576000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f9fb0 to 0xed3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c6c00 INFO: task kworker/0:749:6880 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b58f7000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85570000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ad000 r5:84b34b8c r4:84b34800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85c4bd80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:85d4c38c r4:85d4c000 r4:84b7f980 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/0:751:6898 blocked for more than 467 seconds. r4:85570c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed46de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b3478c r4:84b34400 r7:dddced80 r6:83018000 r5:84b3478c r4:85c4be80 r10:00000000 r9:85c4be80 r8:80287e08 r7:ed469e60 r6:85c4bf00 r5:85570c00 task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b5d47000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:6903 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:6903 tgid:6903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed475d84 r8:00000002 r7:60000113 r6:ed475d8c r5:85575400 r4:85575400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85575400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed475e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cce80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85575400 r7:00000000 r6:83018000 r5:00001000 r4:7f1b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed47d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b3438c r4:84b34000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3438c r4:85c4bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85575400 r8:85c4bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85c4bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c4bf80 r8:80287e08 r7:ed46de60 r6:84994000 r5:85575400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed475fb0 to 0xed475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847cccc0 INFO: task kworker/0:752:6903 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 1d60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:ed1ef000 r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) INFO: task kworker/0:753:6904 blocked for more than 467 seconds. r4:85571800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed435e08 r9:83018005 r8:85571800 r7:00000000 r6:83018000 r5:00001000 r4:7f1b7000 r5:8495ff8c r4:8495fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495ff8c r4:84994080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85571800 r8:849940ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994080 r8:80287e08 r7:ed475e60 r6:84994100 r5:85571800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed435fb0 to 0xed435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ccdc0 INFO: task kworker/0:753:6904 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b66c7000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:6906 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:6906 tgid:6906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed485d84 r8:00000002 r7:60000113 r6:ed485d8c r5:85be6c00 r4:85be6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed485fb0 to 0xed485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ccf40 INFO: task kworker/0:754:6906 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b66c7000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:755:6909 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:6909 tgid:6909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed499d84 r8:00000002 r7:60000113 r6:ed499d8c r5:84be0000 r4:84be0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed499e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85065680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be0000 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed49b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bac38c r4:85bac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bac38c r4:84994280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be0000 r8:849942ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994280 r8:80287e08 r7:ed485e60 r6:84994300 r5:84be0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed499fb0 to 0xed499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ccf40 INFO: task kworker/0:755:6909 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b6ce4000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:756:6913 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:6913 tgid:6913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed491d84 r8:00000002 r7:60000113 r6:ed491d8c r5:84be0c00 r4:84be0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed491e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bac78c r4:85bac400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bac78c r4:84994380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be0c00 r8:849943ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994380 r8:80287e08 r7:ed485e60 r6:84994400 r5:84be0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed491fb0 to 0xed491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d1280 INFO: task kworker/0:756:6913 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b6ce4000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:6914 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:6914 tgid:6914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4add84 r8:00000002 r7:60000113 r6:ed4add8c r5:84be1800 r4:84be1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be1800 r7:00000000 r6:83018000 r5:00001000 r4:7f1c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bacf8c r4:85bacc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bacf8c r4:84994480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be1800 r8:849944ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994480 r8:80287e08 r7:ed485e60 r6:84994500 r5:84be1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4adfb0 to 0xed4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d1280 INFO: task kworker/0:757:6914 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b6ce4000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:758:6918 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:758 state:D stack:0 pid:6918 tgid:6918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4b9d84 r8:00000002 r7:60000013 r6:ed4b9d8c r5:84be2400 r4:84be2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d14c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be2400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bad38c r4:85bad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bad38c r4:84994580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be2400 r8:849945ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994580 r8:80287e08 r7:ed4ade60 r6:84994600 r5:84be2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4b9fb0 to 0xed4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d1300 INFO: task kworker/0:758:6918 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b6ce4000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:6921 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:6921 tgid:6921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed449d84 r8:00000002 r7:60000113 r6:ed449d8c r5:84be3000 r4:84be3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed449e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be3000 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bad78c r4:85bad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bad78c r4:84994680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be3000 r8:849946ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994680 r8:80287e08 r7:ed4b9e60 r6:84994700 r5:84be3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed449fb0 to 0xed449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d1400 INFO: task kworker/0:759:6921 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b71cd000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:760:6923 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:760 state:D stack:0 pid:6923 tgid:6923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4d1d84 r8:00000002 r7:60000113 r6:ed4d1d8c r5:84be3c00 r4:84be3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85badb8c r4:85bad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85badb8c r4:84994780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be3c00 r8:849947ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994780 r8:80287e08 r7:ed449e60 r6:84994800 r5:84be3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4d1fb0 to 0xed4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d1640 INFO: task kworker/0:760:6923 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b755b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:6924 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:6924 tgid:6924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4ddd84 r8:00000002 r7:60000113 r6:ed4ddd8c r5:84be4800 r4:84be4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be4800 r7:00000000 r6:83018000 r5:00001000 r4:7f1cb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85badf8c r4:85badc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85badf8c r4:84994880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be4800 r8:849948ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994880 r8:80287e08 r7:ed4d1e60 r6:84994900 r5:84be4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4ddfb0 to 0xed4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d1700 INFO: task kworker/0:761:6924 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b755b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:6927 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:6927 tgid:6927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4c1d84 r8:00000002 r7:60000113 r6:ed4c1d8c r5:84be5400 r4:84be5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84794040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bae78c r4:85bae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bae78c r4:84994980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be5400 r8:849949ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994980 r8:80287e08 r7:ed4dde60 r6:84994a00 r5:84be5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4c1fb0 to 0xed4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d1900 INFO: task kworker/0:762:6927 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b755b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:6934 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:6934 tgid:6934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed521d84 r8:00000002 r7:60000113 r6:ed521d8c r5:84be9800 r4:84be9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed521e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f1f7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bae38c r4:85bae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bae38c r4:84994a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be9800 r8:84994aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994a80 r8:80287e08 r7:ed4c1e60 r6:84994b00 r5:84be9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed521fb0 to 0xed521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d1dc0 INFO: task kworker/0:763:6934 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b7de0000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:6954 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:6954 tgid:6954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4f1d84 r8:00000002 r7:60000113 r6:ed4f1d8c r5:84be8c00 r4:84be8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84794a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f213000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed59d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85baef8c r4:85baec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85baef8c r4:84994b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be8c00 r8:84994bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994b80 r8:80287e08 r7:ed4c1e60 r6:84994c00 r5:84be8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4f1fb0 to 0xed4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84794080 INFO: task kworker/0:764:6954 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b7f88000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:765:6956 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:765 state:D stack:0 pid:6956 tgid:6956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed541d84 r8:00000002 r7:60000113 r6:ed541d8c r5:84be8000 r4:84be8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed541e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84794940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be8000 r7:00000000 r6:83018000 r5:00001000 r4:7f211000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85baeb8c r4:85bae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85baeb8c r4:84994c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be8000 r8:84994cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994c80 r8:80287e08 r7:ed4f1e60 r6:84994d00 r5:84be8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed541fb0 to 0xed541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84794080 INFO: task kworker/0:765:6956 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b7f88000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:6970 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:6970 tgid:6970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed599d84 r8:00000002 r7:60000113 r6:ed599d8c r5:84beb000 r4:84beb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84beb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed599e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e2b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84beb000 r7:00000000 r6:83018000 r5:00001000 r4:7f2ed000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed635000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b37f8c r4:84b37c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b37f8c r4:84994d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84beb000 r8:84994dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994d80 r8:80287e08 r7:ed4f1e60 r6:84994e00 r5:84beb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed599fb0 to 0xed599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847949c0 INFO: task kworker/0:766:6970 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b84ed000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:6971 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:6971 tgid:6971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed579d84 r8:00000002 r7:60000113 r6:ed579d8c r5:84bec800 r4:84bec800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bec800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed579e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84794bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bec800 r7:00000000 r6:83018000 r5:00001000 r4:7f215000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85baf38c r4:85baf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85baf38c r4:84994e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bec800 r8:84994eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994e80 r8:80287e08 r7:ed599e60 r6:84994f00 r5:84bec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed579fb0 to 0xed579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84794b00 INFO: task kworker/0:767:6971 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b89c1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:768:6974 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:768 state:D stack:0 pid:6974 tgid:6974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5add84 r8:00000002 r7:60000113 r6:ed5add8c r5:84bed400 r4:84bed400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bed400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84794cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bed400 r7:00000000 r6:83018000 r5:00001000 r4:7f217000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d02b8c r4:85d02800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d02b8c r4:84994f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bed400 r8:84994fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84994f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84994f80 r8:80287e08 r7:ed599e60 r6:84797000 r5:84bed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5adfb0 to 0xed5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84794c80 INFO: task kworker/0:768:6974 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b89c1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:6977 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:6977 tgid:6977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed575d84 r8:00000002 r7:60000113 r6:ed575d8c r5:84bee000 r4:84bee000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bee000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed575e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f16c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bee000 r7:00000000 r6:83018000 r5:00001000 r4:7f249000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bafb8c r4:85baf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bafb8c r4:84797080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bee000 r8:847970ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797080 r8:80287e08 r7:ed599e60 r6:84797100 r5:84bee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed575fb0 to 0xed575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84794c80 INFO: task kworker/0:769:6977 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b89c1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:7100 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:7100 tgid:7100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed779d84 r8:00000002 r7:60000113 r6:ed779d8c r5:84beec00 r4:84beec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84beec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed779e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e27c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84beec00 r7:00000000 r6:83018000 r5:00001000 r4:7f2e7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed613000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b3638c r4:84b36000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b3638c r4:84797180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84beec00 r8:847971ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797180 r8:80287e08 r7:ed599e60 r6:84797200 r5:84beec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed779fb0 to 0xed779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852e2000 INFO: task kworker/0:770:7100 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b89c1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:7109 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:7109 tgid:7109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed781d84 r8:00000002 r7:60000113 r6:ed781d8c r5:84bebc00 r4:84bebc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bebc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed781e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2b380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f35b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8478c r4:85d84400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d8478c r4:84797280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bebc00 r8:847972ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797280 r8:80287e08 r7:ed599e60 r6:84797300 r5:84bebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed781fb0 to 0xed781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852e2940 INFO: task kworker/0:771:7109 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b940b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:772:7110 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:772 state:D stack:0 pid:7110 tgid:7110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed785d84 r8:00000002 r7:60000113 r6:ed785d8c r5:84bea400 r4:84bea400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bea400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed785e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f1780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bea400 r7:00000000 r6:83018000 r5:00001000 r4:7f359000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8438c r4:85d84000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d8438c r4:84797380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bea400 r8:847973ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797380 r8:80287e08 r7:ed781e60 r6:84797400 r5:84bea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed785fb0 to 0xed785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852e2940 INFO: task kworker/0:772:7110 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b940b000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:7173 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:7173 tgid:7173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3ddd84 r8:00000002 r7:60000113 r6:ed3ddd8c r5:84be6c00 r4:84be6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f35f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d84f8c r4:85d84c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d84f8c r4:84797480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be6c00 r8:847974ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797480 r8:80287e08 r7:ed781e60 r6:84797500 r5:84be6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3ddfb0 to 0xed3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2bfc0 INFO: task kworker/0:773:7173 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b9838000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:7174 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:7174 tgid:7174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1edd84 r8:00000002 r7:60000113 r6:ed1edd8c r5:84be6000 r4:84be6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8080 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be6000 r7:00000000 r6:83018000 r5:00001000 r4:7f35d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d84b8c r4:85d84800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d84b8c r4:84797580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be6000 r8:847975ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797580 r8:80287e08 r7:ed3dde60 r6:84797600 r5:84be6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1edfb0 to 0xed1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f1640 INFO: task kworker/0:774:7174 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b9838000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:7177 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:7177 tgid:7177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3f1d84 r8:00000002 r7:60000113 r6:ed3f1d8c r5:85572400 r4:85572400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85572400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85572400 r7:00000000 r6:83018000 r5:00001000 r4:7f36d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d85b8c r4:85d85800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d85b8c r4:84797680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85572400 r8:847976ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797680 r8:80287e08 r7:ed3dde60 r6:84797700 r5:85572400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f1fb0 to 0xed3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f82c0 INFO: task kworker/0:775:7177 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b9e5a000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:7178 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:7178 tgid:7178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed40dd84 r8:00000002 r7:60000113 r6:ed40dd8c r5:857a8000 r4:857a8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed40de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f361000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed415000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8538c r4:85d85000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d8538c r4:84797780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a8000 r8:847977ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797780 r8:80287e08 r7:ed3f1e60 r6:84797800 r5:857a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed40dfb0 to 0xed40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f82c0 INFO: task kworker/0:776:7178 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b9e5a000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:7189 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:7189 tgid:7189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed45dd84 r8:00000002 r7:60000113 r6:ed45dd8c r5:857a8c00 r4:857a8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed45de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f8500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f39d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8638c r4:85d86000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d8638c r4:84797880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a8c00 r8:847978ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797880 r8:80287e08 r7:ed3f1e60 r6:84797900 r5:857a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed45dfb0 to 0xed45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f8800 INFO: task kworker/0:777:7189 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b9e5a000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:7190 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:7190 tgid:7190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed461d84 r8:00000002 r7:60000113 r6:ed461d8c r5:857ab000 r4:857ab000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ab000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed461e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa42c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f397000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed49f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8594a38c r4:8594a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8594a38c r4:84797980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ab000 r8:847979ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797980 r8:80287e08 r7:ed45de60 r6:84797a00 r5:857ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed461fb0 to 0xed461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f8800 INFO: task kworker/0:778:7190 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: b9e5a000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:779:7220 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:779 state:D stack:0 pid:7220 tgid:7220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed58dd84 r8:00000002 r7:60000113 r6:ed58dd8c r5:857ac800 r4:857ac800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ac800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed58de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842a5e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f4fb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abdf8c r4:84abdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abdf8c r4:84797a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ac800 r8:84797aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797a80 r8:80287e08 r7:ed45de60 r6:84797b00 r5:857ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed58dfb0 to 0xed58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f85c0 INFO: task kworker/0:779:7220 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: ba2b3000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:7221 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:7221 tgid:7221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed43dd84 r8:00000002 r7:60000113 r6:ed43dd8c r5:857ad400 r4:857ad400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ad400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed43de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511df00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f4e9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d8778c r4:85d87400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d8778c r4:84797b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ad400 r8:84797bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797b80 r8:80287e08 r7:ed58de60 r6:84797c00 r5:857ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed43dfb0 to 0xed43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f85c0 INFO: task kworker/0:780:7221 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: ba6ce000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:7395 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:7395 tgid:7395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed89dd84 r8:00000002 r7:60000113 r6:ed89dd8c r5:857aa400 r4:857aa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857aa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed89de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511dd40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f4eb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d87b8c r4:85d87800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d87b8c r4:84797f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857aa400 r8:84797fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797f80 r8:80287e08 r7:ed58de60 r6:84797f00 r5:857aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed89dfb0 to 0xed89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511de80 INFO: task kworker/0:781:7395 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: ba6ce000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:7401 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:7401 tgid:7401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed795d84 r8:00000002 r7:60000113 r6:ed795d8c r5:857ae000 r4:857ae000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ae000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed795e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8511d640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f4f9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d87f8c r4:85d87c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d87f8c r4:84797d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ae000 r8:84797dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797d80 r8:80287e08 r7:ed58de60 r6:84797e00 r5:857ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed795fb0 to 0xed795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511de80 INFO: task kworker/0:782:7401 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: ba6ce000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:7406 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:7406 tgid:7406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed855d84 r8:00000002 r7:60000113 r6:ed855d8c r5:857aec00 r4:857aec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857aec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed855e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847660c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f6bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c30f8c r4:85c30c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c30f8c r4:84797e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857aec00 r8:84797eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797e80 r8:80287e08 r7:ed58de60 r6:84797d00 r5:857aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed855fb0 to 0xed855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8511d480 INFO: task kworker/0:783:7406 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bb37f000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:7632 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:7632 tgid:7632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edb91d84 r8:00000002 r7:60000113 r6:edb91d8c r5:85cb6c00 r4:85cb6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb91e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84766040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abd38c r4:84abd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abd38c r4:84797c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb6c00 r8:84797cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84797c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797c80 r8:80287e08 r7:ed855e60 r6:84609000 r5:85cb6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb91fb0 to 0xedb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84767340 INFO: task kworker/0:784:7632 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bb37f000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:7649 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:7649 tgid:7649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edbc1d84 r8:00000002 r7:60000113 r6:edbc1d8c r5:85cb3c00 r4:85cb3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbc1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e97980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f835000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1ab8c r4:84b1a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1ab8c r4:84609080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb3c00 r8:846090ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609080 r8:80287e08 r7:ed855e60 r6:84609100 r5:85cb3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbc1fb0 to 0xedbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84766080 INFO: task kworker/0:785:7649 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bb668000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:7651 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:7651 tgid:7651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edbb9d84 r8:00000002 r7:60000113 r6:edbb9d8c r5:85cb4800 r4:85cb4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edbb9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84766bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb4800 r7:00000000 r6:83018000 r5:00001000 r4:7f6e3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84abcb8c r4:84abc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84abcb8c r4:84609180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb4800 r8:846091ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609180 r8:80287e08 r7:edbc1e60 r6:84609200 r5:85cb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedbb9fb0 to 0xedbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84766080 INFO: task kworker/0:786:7651 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bb668000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:787:7686 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:787 state:D stack:0 pid:7686 tgid:7686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edc41d84 r8:00000002 r7:60000113 r6:edc41d8c r5:85cb3000 r4:85cb3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edc41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848a3500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f761000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1a78c r4:84b1a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1a78c r4:84609280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb3000 r8:846092ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609280 r8:80287e08 r7:edbc1e60 r6:84609300 r5:85cb3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedc41fb0 to 0xedc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84766e00 INFO: task kworker/0:787:7686 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bba72000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:7746 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:7746 tgid:7746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edd95d84 r8:00000002 r7:60000113 r6:edd95d8c r5:85cb0000 r4:85cb0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85826dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edebf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e57b8c r4:85e57800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85e57b8c r4:84609380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb0000 r8:846093ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609380 r8:80287e08 r7:edbc1e60 r6:84609400 r5:85cb0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd95fb0 to 0xedd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848a34c0 INFO: task kworker/0:788:7746 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bba72000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:7838 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:7838 tgid:7838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edef1d84 r8:00000002 r7:60000113 r6:edef1d8c r5:85cb6000 r4:85cb6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edef1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84767d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f895000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eddf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1a38c r4:84b1a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1a38c r4:84609480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb6000 r8:846094ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609480 r8:80287e08 r7:edbc1e60 r6:84609500 r5:85cb6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedef1fb0 to 0xedef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85e97140 INFO: task kworker/0:789:7838 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bba72000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:7906 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:7906 tgid:7906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edd85d84 r8:00000002 r7:60000113 r6:edd85d8c r5:85cb0c00 r4:85cb0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edd85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d450c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f8b1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee013000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1978c r4:84b19400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1978c r4:84609580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb0c00 r8:846095ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609580 r8:80287e08 r7:edef1e60 r6:84609600 r5:85cb0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedd85fb0 to 0xedd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84767ac0 INFO: task kworker/0:790:7906 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bc3c1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:791:7907 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:791 state:D stack:0 pid:7907 tgid:7907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edff9d84 r8:00000002 r7:60000113 r6:edff9d8c r5:85cb5400 r4:85cb5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d45000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb5400 r7:00000000 r6:83018000 r5:00001000 r4:7f8af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b19b8c r4:84b19800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b19b8c r4:84609680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb5400 r8:846096ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609680 r8:80287e08 r7:edd85e60 r6:84609700 r5:85cb5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedff9fb0 to 0xedff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84767ac0 INFO: task kworker/0:791:7907 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bc3c1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:792:7922 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:792 state:D stack:0 pid:7922 tgid:7922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edf99d84 r8:00000002 r7:60000113 r6:edf99d8c r5:857abc00 r4:857abc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857abc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d452c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f8b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee023000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1938c r4:84b19000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1938c r4:84609780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857abc00 r8:846097ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609780 r8:80287e08 r7:edd85e60 r6:84609800 r5:857abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf99fb0 to 0xedf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d45100 INFO: task kworker/0:792:7922 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bc3c1000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:793:7925 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:793 state:D stack:0 pid:7925 tgid:7925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee021d84 r8:00000002 r7:60000113 r6:ee021d8c r5:857a9800 r4:857a9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee021e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d453c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f8b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee029000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85eb138c r4:85eb1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85eb138c r4:84609880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a9800 r8:846098ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609880 r8:80287e08 r7:edf99e60 r6:84609900 r5:857a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee021fb0 to 0xee021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d45200 INFO: task kworker/0:793:7925 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bc7d9000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:794:7927 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:794 state:D stack:0 pid:7927 tgid:7927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:edffdd84 r8:00000002 r7:60000113 r6:edffdd8c r5:85cb1800 r4:85cb1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edffde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d454c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f8b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee033000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85eb178c r4:85eb1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85eb178c r4:84609980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb1800 r8:846099ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609980 r8:80287e08 r7:ee021e60 r6:84609a00 r5:85cb1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedffdfb0 to 0xedffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d45200 INFO: task kworker/0:794:7927 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bcc5d000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:795:7928 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:795 state:D stack:0 pid:7928 tgid:7928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee031d84 r8:00000002 r7:60000113 r6:ee031d8c r5:85cb2400 r4:85cb2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cb2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee031e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b55cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85cb2400 r7:00000000 r6:83018000 r5:00001000 r4:7fb7f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee529000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f34b8c r4:85f34800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85f34b8c r4:84609a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cb2400 r8:84609aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609a80 r8:80287e08 r7:edffde60 r6:84609b00 r5:85cb2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee031fb0 to 0xee031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d45500 INFO: task kworker/0:795:7928 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bcc5d000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:796:7963 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:7963 tgid:7963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee041d84 r8:00000002 r7:60000113 r6:ee041d8c r5:85c69800 r4:85c69800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c69800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee041e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad1280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c69800 r7:00000000 r6:83018000 r5:00001000 r4:7f9fb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b1838c r4:84b18000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b1838c r4:84609b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c69800 r8:84609bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609b80 r8:80287e08 r7:ee031e60 r6:84609c00 r5:85c69800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee041fb0 to 0xee041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858263c0 INFO: task kworker/0:796:7963 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bcc5d000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:797:8103 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:797 state:D stack:0 pid:8103 tgid:8103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee341d84 r8:00000002 r7:60000113 r6:ee341d8c r5:85c6a400 r4:85c6a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c6a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee341e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad1380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c6a400 r7:00000000 r6:83018000 r5:00001000 r4:7f9fd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edfa7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8482cf8c r4:8482cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8482cf8c r4:84609c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c6a400 r8:84609cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609c80 r8:80287e08 r7:ee031e60 r6:84609d00 r5:85c6a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee341fb0 to 0xee341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ad1300 INFO: task kworker/0:797:8103 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bcfd2000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:8112 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:798 state:D stack:0 pid:8112 tgid:8112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ee36dd84 r8:00000002 r7:60000113 r6:ee36dd8c r5:85c68c00 r4:85c68c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c68c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee36de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d7eec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c68c00 r7:00000000 r6:83018000 r5:00001000 r4:7fa0d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d74f8c r4:85d74c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d74f8c r4:84609d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c68c00 r8:84609dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84609d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84609d80 r8:80287e08 r7:ee031e60 r6:84609e00 r5:85c68c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee36dfb0 to 0xee36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ad1940 INFO: task kworker/0:798:8112 is blocked on a mutex likely owned by task kworker/1:380:5038. task:kworker/1:380 state:R running task stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85612400 r8:80200be4 r7:eb5f1d5c r6:ffffffff r5:85612400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5f1d28 to 0xeb5f1d70) 1d20: bd404000 ea9bd000 00000001 80239b98 7f361000 00000001 1d40: 82ac15a0 7f361000 ea9bd000 8280c928 82ac21c4 eb5f1da4 eb5f1da8 eb5f1d78 1d60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5f1dc0 r5:eb5f1e08 r4:eb5f1dc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa4c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f39f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4c38c r4:85d4c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d4c38c r4:84b7f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:84b7f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b7f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b7f980 r8:80287e08 r7:eb5e5e60 r6:84b7fa00 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b75e80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0013 r5:600f0093 r4:82257e84 [<80201ac8>] (show_stack) from [<8021ff98>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<8021ffa4>] (dump_stack) from [<81a3d2ac>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a3d14c>] (nmi_cpu_backtrace) from [<81a3d3f8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c610 r5:8281af00 r4:ffffffff [<81a3d2c8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:000196e1 r8:82ab6564 r7:8280c788 r6:000079cc r5:8281b4c8 r4:85d93f0c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:80386900 r7:832f0300 r6:832f0300 r5:83259800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:832c6300 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2821 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a5c4cc>] lr : [<80a62aec>] psr: 60070113 sp : ebf1deb0 ip : ebf1dec0 fp : ebf1debc r10: 8295b3bc r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295b320 r5 : 00000000 r4 : 00000001 r3 : 0000b273 r2 : 00000000 r1 : 60070113 r0 : 841b6c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 8471e040 DAC: fffffffd Call trace: [<81a5c4a4>] (_raw_spin_unlock_irqrestore) from [<80a62aec>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a5c4a4>] (_raw_spin_unlock_irqrestore) from [<80a62aec>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a5c4a4>] (_raw_spin_unlock_irqrestore) from [<80a62aec>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a62acc>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c610 r5:84322400 r4:8295b320 [<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295b320 r8:802efd8c r7:84542a00 r6:84542a00 r5:84322400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf1dfb0 to 0xebf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:838ac6c0