Extracting prog: 11m47.185316452s Minimizing prog: 1h25m52.739612043s Simplifying prog options: 0s Extracting C: 9m2.058087422s Simplifying C: 55m23.756908879s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-ioctl$sock_SIOCGIFINDEX detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN-ioctl$sock_SIOCGIFINDEX detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 3 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h42m5.739962767s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:83236000 r4:83236000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84379f8c r4:84379c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84379f8c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:df819e48 r6:830b8480 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b51c0 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: adac4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:4:3046 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3046 tgid:3046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7a9d84 r8:00000002 r7:60000113 r6:ec7a9d8c r5:84543000 r4:84543000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84543000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84832280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84543000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84901f8c r4:84901c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84901f8c r4:847d1080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84543000 r8:847d10ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847d1080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d1080 r8:80287e08 r7:df841e60 r6:84795300 r5:84543000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a9fb0 to 0xec7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84309ec0 INFO: task kworker/0:4:3046 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ae9b9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/1:0:3110 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3110 tgid:3110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9a9d84 r8:00000002 r7:60000013 r6:df9a9d8c r5:84156000 r4:84156000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84156000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84156000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852df78c r4:852df400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852df78c r4:84795800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84156000 r8:8479582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795800 r8:80287e08 r7:eaf51e60 r6:84795a00 r5:84156000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8338ea40 INFO: task kworker/1:0:3110 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: af95b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:5:3114 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3114 tgid:3114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:84543c00 r4:84543c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84543c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84543c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0113000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b5b8c r4:844b5800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b5b8c r4:847e2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84543c00 r8:847e222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2200 r8:80287e08 r7:ec7a9e60 r6:84795980 r5:84543c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83902840 INFO: task kworker/0:5:3114 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: af95b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:6:3118 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:84156c00 r4:84156c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84156c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84936c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84156c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb83000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b678c r4:844b6400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b678c r4:847e2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84156c00 r8:847e22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2280 r8:80287e08 r7:ec7a9e60 r6:84795c80 r5:84156c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842f4d00 INFO: task kworker/0:6:3118 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: afda0000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:7:3120 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:84542400 r4:84542400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84542400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953400 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84542400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84395f8c r4:84395c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84395f8c r4:847e2300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84542400 r8:847e232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2300 r8:80287e08 r7:ec7a9e60 r6:84795c00 r5:84542400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848320c0 INFO: task kworker/0:7:3120 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b031f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:8:3123 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:841abc00 r4:841abc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841abc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df965000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84900b8c r4:84900800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84900b8c r4:847e2380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841abc00 r8:847e23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2380 r8:80287e08 r7:ec7a9e60 r6:84795e00 r5:841abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832140 INFO: task kworker/0:8:3123 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b031f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:9:3124 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df96dd84 r8:00000002 r7:60000113 r6:df96dd8c r5:84579800 r4:84579800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84579800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84579800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd55000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848ba38c r4:848ba000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848ba38c r4:847e2400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84579800 r8:847e242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2400 r8:80287e08 r7:ec7a9e60 r6:847e2480 r5:84579800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf96dfb0 to 0xdf96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832280 INFO: task kworker/0:9:3124 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b05c7000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:10:3127 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84578c00 r4:84578c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84578c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493a8c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84578c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a878c r4:850a8400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a878c r4:847e2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84578c00 r8:847e252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2500 r8:80287e08 r7:ec7a9e60 r6:847e2580 r5:84578c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832500 INFO: task kworker/0:10:3127 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b089c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:11:3128 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df975d84 r8:00000002 r7:60000113 r6:df975d8c r5:8457d400 r4:8457d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cac80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd73000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84903f8c r4:84903c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84903f8c r4:847e2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457d400 r8:847e262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2600 r8:80287e08 r7:df9f5e60 r6:847e2680 r5:8457d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf975fb0 to 0xdf975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832800 INFO: task kworker/0:11:3128 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b0d70000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3131 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:8457c800 r4:8457c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ea000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a9b8c r4:850a9800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a9b8c r4:847e2700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457c800 r8:847e272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2700 r8:80287e08 r7:df9f5e60 r6:847e2780 r5:8457c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832780 INFO: task kworker/0:12:3131 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1219000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3133 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:8457ec00 r4:8457ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4f80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c738c r4:851c7000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c738c r4:847e2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457ec00 r8:847e282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2800 r8:80287e08 r7:dfa15e60 r6:847e2880 r5:8457ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832900 INFO: task kworker/0:13:3133 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1219000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3135 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:8457a400 r4:8457a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fd80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe27000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ab38c r4:850ab000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ab38c r4:847e2900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457a400 r8:847e292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2900 r8:80287e08 r7:dfa29e60 r6:847e2980 r5:8457a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832a80 INFO: task kworker/0:14:3135 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1219000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3137 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83236c00 r4:83236c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8e80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa03000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d538c r4:851d5000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d538c r4:847e2a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236c00 r8:847e2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2a00 r8:80287e08 r7:dfa29e60 r6:847e2a80 r5:83236c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832c00 INFO: task kworker/0:15:3137 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1a6e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3139 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:832fec00 r4:832fec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832fec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf71000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535d38c r4:8535d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535d38c r4:847e2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832fec00 r8:847e2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2b00 r8:80287e08 r7:dfa3de60 r6:847e2b80 r5:832fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832dc0 INFO: task kworker/0:16:3139 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1a6e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3140 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa1dd84 r8:00000002 r7:60000013 r6:dfa1dd8c r5:832f8000 r4:832f8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832f8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852489c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d6b8c r4:851d6800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d6b8c r4:847e2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f8000 r8:847e2c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2c00 r8:80287e08 r7:dfa45e60 r6:847e2c80 r5:832f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8431b280 INFO: task kworker/0:17:3140 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1fce000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3142 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:832fe000 r4:832fe000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832fe000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d50c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af4b8c r4:84af4800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af4b8c r4:847e2d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832fe000 r8:847e2d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2d00 r8:80287e08 r7:dfa45e60 r6:847e2d80 r5:832fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845deac0 INFO: task kworker/0:18:3142 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1fce000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3146 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:832f9800 r4:832f9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832f9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539de40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0607000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535df8c r4:8535dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535df8c r4:847e2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f9800 r8:847e2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2e00 r8:80287e08 r7:dfa45e60 r6:847e2e80 r5:832f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3a380 INFO: task kworker/0:19:3146 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b21d9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa95d84 r8:00000002 r7:60000013 r6:dfa95d8c r5:841ae000 r4:841ae000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ae000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa55000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535e78c r4:8535e400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535e78c r4:847e2f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ae000 r8:847e2fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2f80 r8:80287e08 r7:dfa8de60 r6:84795d00 r5:841ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3a340 INFO: task kworker/0:21:3151 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b29da000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3447 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3447 tgid:3447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dff21d84 r8:00000002 r7:60000113 r6:dff21d8c r5:84b41800 r4:84b41800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b41800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff21e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b41800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b638c r4:844b6000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b638c r4:84944180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b41800 r8:849441ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84944180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944180 r8:80287e08 r7:dfb39e60 r6:84944200 r5:84b41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff21fb0 to 0xdff21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84951940 INFO: task kworker/0:43:3447 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b29da000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3450 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3450 tgid:3450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdbdd84 r8:00000002 r7:60000113 r6:dfdbdd8c r5:84b43c00 r4:84b43c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b43c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdbde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae2040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b43c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84affb8c r4:84aff800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84affb8c r4:84944380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b43c00 r8:849443ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84944380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944380 r8:80287e08 r7:dff21e60 r6:84944400 r5:84b43c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdbdfb0 to 0xdfdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84951b80 INFO: task kworker/0:45:3450 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b2a82000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:138:3472 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:3472 tgid:3472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dff95d84 r8:00000002 r7:60000113 r6:dff95d8c r5:848e4800 r4:848e4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84954f8c r4:84954c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84954f8c r4:8483ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e4800 r8:8483ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac00 r8:80287e08 r7:dff71e60 r6:84944980 r5:848e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839940 INFO: task kworker/1:138:3472 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b2f3c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:139:3474 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dff9dd84 r8:00000002 r7:60000013 r6:dff9dd8c r5:848e3c00 r4:848e3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff9de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 INFO: task kworker/1:139:3474 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b323b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:3476 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:3476 tgid:3476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffa5d84 r8:00000002 r7:60000113 r6:dffa5d8c r5:848e6000 r4:848e6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839bc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553f8c r4:84553c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553f8c r4:8483ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e6000 r8:8483ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ad00 r8:80287e08 r7:dff95e60 r6:84944a80 r5:848e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffa5fb0 to 0xdffa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839e80 INFO: task kworker/1:140:3476 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b34d6000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:3478 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:3478 tgid:3478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffadd84 r8:00000002 r7:60000113 r6:dffadd8c r5:848e6c00 r4:848e6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495438c r4:84954000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495438c r4:8483ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e6c00 r8:8483adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ad80 r8:80287e08 r7:dff95e60 r6:84944b00 r5:848e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffadfb0 to 0xdffadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839d00 INFO: task kworker/1:141:3478 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b34d6000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:3480 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:3480 tgid:3480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffb5d84 r8:00000002 r7:60000113 r6:dffb5d8c r5:848e0000 r4:848e0000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e0000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495478c r4:84954400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495478c r4:8483ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0000 r8:8483ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ae00 r8:80287e08 r7:dff95e60 r6:84944b80 r5:848e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb5fb0 to 0xdffb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84951580 INFO: task kworker/1:142:3480 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b392d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:3482 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:3482 tgid:3482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffbdd84 r8:00000002 r7:60000013 r6:dffbdd8c r5:84b50c00 r4:84b50c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b50c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffbde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483bac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b50c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84954b8c r4:84954800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84954b8c r4:8483ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b50c00 r8:8483aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ae80 r8:80287e08 r7:dff95e60 r6:84944c00 r5:84b50c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffbdfb0 to 0xdffbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839ec0 INFO: task kworker/1:143:3482 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b3de2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:3485 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffc5d84 r8:00000002 r7:60000113 r6:dffc5d8c r5:84b52400 r4:84b52400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b52400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b52400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd3d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495578c r4:84955400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495578c r4:8483af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b52400 r8:8483af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483af00 r8:80287e08 r7:dff95e60 r6:84944c80 r5:84b52400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc5fb0 to 0xdffc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6100 INFO: task kworker/1:144:3485 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b3de2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:3486 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:3486 tgid:3486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffc9d84 r8:00000002 r7:60000113 r6:dffc9d8c r5:84b53000 r4:84b53000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b53000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b53000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd2b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495538c r4:84955000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495538c r4:8483af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b53000 r8:8483afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483af80 r8:80287e08 r7:dffc5e60 r6:84944d00 r5:84b53000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6100 INFO: task kworker/1:145:3486 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b4659000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:146:3488 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffd1d84 r8:00000002 r7:60000113 r6:dffd1d8c r5:84b54800 r4:84b54800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b54800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b54800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd45000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84955b8c r4:84955800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84955b8c r4:84bf7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b54800 r8:84bf702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7000 r8:80287e08 r7:dffc5e60 r6:84944d80 r5:84b54800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd1fb0 to 0xdffd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf61c0 INFO: task kworker/1:146:3488 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b4889000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:3490 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:3490 tgid:3490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffd9d84 r8:00000002 r7:60000113 r6:dffd9d8c r5:84b53c00 r4:84b53c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b53c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84955f8c r4:84955c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84955f8c r4:84bf7080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b53c00 r8:84bf70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7080 r8:80287e08 r7:dffd1e60 r6:84944e00 r5:84b53c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd9fb0 to 0xdffd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6280 INFO: task kworker/1:147:3490 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b4c07000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:148:3492 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:148 state:D stack:0 pid:3492 tgid:3492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffe1d84 r8:00000002 r7:60000013 r6:dffe1d8c r5:84b56000 r4:84b56000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b56000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b56000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd71000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495678c r4:84956400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495678c r4:84bf7100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b56000 r8:84bf712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7100 r8:80287e08 r7:dffd9e60 r6:84944e80 r5:84b56000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf63c0 INFO: task kworker/1:148:3492 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b4f66000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:149:3496 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:149 state:D stack:0 pid:3496 tgid:3496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffb9d84 r8:00000002 r7:60000113 r6:dffb9d8c r5:84b51800 r4:84b51800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b51800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6980 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b51800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84956f8c r4:84956c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84956f8c r4:84bf7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b51800 r8:84bf75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7580 r8:80287e08 r7:dffe1e60 r6:84944f00 r5:84b51800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb9fb0 to 0xdffb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6740 INFO: task kworker/1:149:3496 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5286000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3497 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3497 tgid:3497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffe5d84 r8:00000002 r7:60000113 r6:dffe5d8c r5:84b56c00 r4:84b56c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b56c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc43000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437bb8c r4:8437b800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8437bb8c r4:84944f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b56c00 r8:84944fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84944f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944f80 r8:80287e08 r7:dff21e60 r6:848c4000 r5:84b56c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe5fb0 to 0xdffe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ae2e80 INFO: task kworker/0:46:3497 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5286000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:150:3499 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:150 state:D stack:0 pid:3499 tgid:3499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffedd84 r8:00000002 r7:60000013 r6:dffedd8c r5:84b50000 r4:84b50000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b50000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6880 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b50000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd7d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84956b8c r4:84956800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84956b8c r4:84bf7600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b50000 r8:84bf762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7600 r8:80287e08 r7:dffb9e60 r6:848c4080 r5:84b50000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffedfb0 to 0xdffedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6800 INFO: task kworker/1:150:3499 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5898000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:3501 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84b55400 r4:84b55400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b55400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbbc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b55400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437a78c r4:8437a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437a78c r4:84bf7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b55400 r8:84bf76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7680 r8:80287e08 r7:dffb9e60 r6:848c4100 r5:84b55400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff5fb0 to 0xdfff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6c00 INFO: task kworker/1:151:3501 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5c23000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:152:3502 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:3502 tgid:3502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfff9d84 r8:00000002 r7:60000113 r6:dfff9d8c r5:84ba8000 r4:84ba8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba8000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495738c r4:84957000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495738c r4:84bf7700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba8000 r8:84bf772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7700 r8:80287e08 r7:dfff5e60 r6:848c4180 r5:84ba8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff9fb0 to 0xdfff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6c00 INFO: task kworker/1:152:3502 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5c23000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:153:3504 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:153 state:D stack:0 pid:3504 tgid:3504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0001d84 r8:00000002 r7:60000013 r6:e0001d8c r5:84ba9800 r4:84ba9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0001e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495778c r4:84957400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495778c r4:84bf7780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba9800 r8:84bf77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7780 r8:80287e08 r7:dfff5e60 r6:848c4200 r5:84ba9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0001fb0 to 0xe0001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6a80 INFO: task kworker/1:153:3504 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b631a000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:154:3506 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:154 state:D stack:0 pid:3506 tgid:3506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0009d84 r8:00000002 r7:60000113 r6:e0009d8c r5:84ba8c00 r4:84ba8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84957b8c r4:84957800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84957b8c r4:84bf7880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba8c00 r8:84bf78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7880 r8:80287e08 r7:dfff5e60 r6:848c4280 r5:84ba8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0009fb0 to 0xe0009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6b80 INFO: task kworker/1:154:3506 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b689b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:155:3508 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:3508 tgid:3508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0011d84 r8:00000002 r7:60000113 r6:e0011d8c r5:84baa400 r4:84baa400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84baa400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0011e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6e40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84baa400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84957f8c r4:84957c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84957f8c r4:84bf7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84baa400 r8:84bf782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7800 r8:80287e08 r7:dfff5e60 r6:848c4300 r5:84baa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0011fb0 to 0xe0011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6d40 INFO: task kworker/1:155:3508 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b6c53000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:3510 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:3510 tgid:3510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0019d84 r8:00000002 r7:60000113 r6:e0019d8c r5:84bab000 r4:84bab000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bab000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0019e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bab000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495638c r4:84956000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495638c r4:84bf7900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bab000 r8:84bf792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7900 r8:80287e08 r7:dfff5e60 r6:848c4380 r5:84bab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0019fb0 to 0xe0019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483bd00 INFO: task kworker/1:156:3510 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:157:3512 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:157 state:D stack:0 pid:3512 tgid:3512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfe39d84 r8:00000002 r7:60000113 r6:dfe39d8c r5:84babc00 r4:84babc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84babc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe39e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84babc00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df877000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437838c r4:84378000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437838c r4:84bf7980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84babc00 r8:84bf79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7980 r8:80287e08 r7:dfff5e60 r6:848c4400 r5:84babc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe39fb0 to 0xdfe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb0c0 INFO: task kworker/1:157:3512 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:3514 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:3514 tgid:3514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfe49d84 r8:00000002 r7:60000113 r6:dfe49d8c r5:84bac800 r4:84bac800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bac800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe49e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb180 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bac800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df96f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437878c r4:84378400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437878c r4:84bf7a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bac800 r8:84bf7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7a00 r8:80287e08 r7:dfff5e60 r6:848c4480 r5:84bac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe49fb0 to 0xdfe49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb200 INFO: task kworker/1:158:3514 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:159:3516 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:159 state:D stack:0 pid:3516 tgid:3516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfe5dd84 r8:00000002 r7:60000013 r6:dfe5dd8c r5:84bad400 r4:84bad400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bad400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe5de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bad400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84378b8c r4:84378800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84378b8c r4:84bf7a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bad400 r8:84bf7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7a80 r8:80287e08 r7:dfff5e60 r6:848c4500 r5:84bad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe5dfb0 to 0xdfe5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb380 INFO: task kworker/1:159:3516 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:160:3518 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:160 state:D stack:0 pid:3518 tgid:3518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfe89d84 r8:00000002 r7:60000013 r6:dfe89d8c r5:84bae000 r4:84bae000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bae000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe89e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bae000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84378f8c r4:84378c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84378f8c r4:84bf7b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bae000 r8:84bf7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7b00 r8:80287e08 r7:dfff5e60 r6:848c4580 r5:84bae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe89fb0 to 0xdfe89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb240 INFO: task kworker/1:160:3518 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b7c21000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:3520 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:3520 tgid:3520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfeb9d84 r8:00000002 r7:60000013 r6:dfeb9d8c r5:84baec00 r4:84baec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84baec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84baec00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb63000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437938c r4:84379000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437938c r4:84bf7b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84baec00 r8:84bf7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7b80 r8:80287e08 r7:dfff5e60 r6:848c4600 r5:84baec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeb9fb0 to 0xdfeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb140 INFO: task kworker/1:161:3520 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b7d8f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:162:3522 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:162 state:D stack:0 pid:3522 tgid:3522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0021d84 r8:00000002 r7:60000113 r6:e0021d8c r5:84ad0c00 r4:84ad0c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad0c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0021e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437978c r4:84379400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437978c r4:84bf7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad0c00 r8:84bf7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7c00 r8:80287e08 r7:dfff5e60 r6:848c4680 r5:84ad0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0021fb0 to 0xe0021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb540 INFO: task kworker/1:162:3522 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b7f0d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:163:3524 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:163 state:D stack:0 pid:3524 tgid:3524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:84ad0000 r4:84ad0000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad0000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad0000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84379b8c r4:84379800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84379b8c r4:84bf7c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad0000 r8:84bf7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7c80 r8:80287e08 r7:dfff5e60 r6:848c4700 r5:84ad0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb680 INFO: task kworker/1:163:3524 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b8200000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:164:3526 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:164 state:D stack:0 pid:3526 tgid:3526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:84bbe000 r4:84bbe000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbe000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbe000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437a38c r4:8437a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437a38c r4:84bf7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbe000 r8:84bf7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7d00 r8:80287e08 r7:dfff5e60 r6:84bf7d80 r5:84bbe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffddfb0 to 0xdffddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb980 INFO: task kworker/1:164:3526 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b8531000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:165:3530 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:165 state:D stack:0 pid:3530 tgid:3530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e002dd84 r8:00000002 r7:60000013 r6:e002dd8c r5:84bbec00 r4:84bbec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c2c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437b78c r4:8437b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437b78c r4:84bf7e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbec00 r8:84bf7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7e00 r8:80287e08 r7:dfff5e60 r6:84bf7e80 r5:84bbec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe002dfb0 to 0xe002dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbb40 INFO: task kworker/1:165:3530 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b87b9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:166:3531 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:166 state:D stack:0 pid:3531 tgid:3531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdd9d84 r8:00000002 r7:60000113 r6:dfdd9d8c r5:84bbd400 r4:84bbd400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbd400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbe00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437ab8c r4:8437a800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437ab8c r4:84bf7f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbd400 r8:84bf7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7f00 r8:80287e08 r7:e002de60 r6:84bf7f80 r5:84bbd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd9fb0 to 0xdfdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbb40 INFO: task kworker/1:166:3531 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b8a53000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:167:3534 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:167 state:D stack:0 pid:3534 tgid:3534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0039d84 r8:00000002 r7:60000013 r6:e0039d8c r5:84bba400 r4:84bba400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bba400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0039e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bba400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbfd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437af8c r4:8437ac00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437af8c r4:84bf7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bba400 r8:84bf752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7500 r8:80287e08 r7:e002de60 r6:84bf7180 r5:84bba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0039fb0 to 0xe0039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbf00 INFO: task kworker/1:167:3534 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b8cfa000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:168:3536 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:3536 tgid:3536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e003dd84 r8:00000002 r7:60000013 r6:e003dd8c r5:84bb6c00 r4:84bb6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc19000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437b38c r4:8437b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437b38c r4:84bf7200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb6c00 r8:84bf722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7200 r8:80287e08 r7:e002de60 r6:84bf7280 r5:84bb6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe003dfb0 to 0xe003dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c100 INFO: task kworker/1:168:3536 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b9356000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:169:3538 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:169 state:D stack:0 pid:3538 tgid:3538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0041d84 r8:00000002 r7:60000013 r6:e0041d8c r5:84bbbc00 r4:84bbbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0041e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437bf8c r4:8437bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437bf8c r4:84bf7300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbbc00 r8:84bf732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7300 r8:80287e08 r7:e002de60 r6:84bf7380 r5:84bbbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0041fb0 to 0xe0041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c280 INFO: task kworker/1:169:3538 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b9356000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3540 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0045d84 r8:00000002 r7:60000113 r6:e0045d8c r5:84ad3000 r4:84ad3000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad3000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0045e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84936d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad3000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8439438c r4:84394000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439438c r4:848c4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad3000 r8:848c47ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848c4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c4780 r8:80287e08 r7:dff21e60 r6:848c4800 r5:84ad3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0045fb0 to 0xe0045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c33c0 INFO: task kworker/0:47:3540 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b9bc2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:170:3542 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:3542 tgid:3542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e004dd84 r8:00000002 r7:60000113 r6:e004dd8c r5:84ad4800 r4:84ad4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc83000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afff8c r4:84affc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84afff8c r4:84bf7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad4800 r8:84bf742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7400 r8:80287e08 r7:e0041e60 r6:848c4880 r5:84ad4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe004dfb0 to 0xe004dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c500 INFO: task kworker/1:170:3542 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b9bc2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:171:3543 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:171 state:D stack:0 pid:3543 tgid:3543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0051d84 r8:00000002 r7:60000113 r6:e0051d8c r5:84ad2400 r4:84ad2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0051e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495838c r4:84958000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495838c r4:84bf7480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad2400 r8:84bf74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7480 r8:80287e08 r7:e004de60 r6:848c4900 r5:84ad2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0051fb0 to 0xe0051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c700 INFO: task kworker/1:171:3543 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ba417000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:172:3546 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:172 state:D stack:0 pid:3546 tgid:3546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0055d84 r8:00000002 r7:60000113 r6:e0055d8c r5:84ad3c00 r4:84ad3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495878c r4:84958400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495878c r4:843b0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad3c00 r8:843b002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0000 r8:80287e08 r7:e004de60 r6:848c4980 r5:84ad3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0055fb0 to 0xe0055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c840 INFO: task kworker/1:172:3546 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ba57f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:173:3548 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:173 state:D stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0059d84 r8:00000002 r7:60000113 r6:e0059d8c r5:84ad5400 r4:84ad5400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad5400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433ca00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad5400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84958b8c r4:84958800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84958b8c r4:843b0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad5400 r8:843b00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0080 r8:80287e08 r7:e0055e60 r6:848c4a00 r5:84ad5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0059fb0 to 0xe0059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c900 INFO: task kworker/1:173:3548 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ba911000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:3550 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:3550 tgid:3550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e005dd84 r8:00000002 r7:60000113 r6:e005dd8c r5:84ad6000 r4:84ad6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e005de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cc40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84958f8c r4:84958c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84958f8c r4:843b0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6000 r8:843b012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0100 r8:80287e08 r7:e0059e60 r6:848c4a80 r5:84ad6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe005dfb0 to 0xe005dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c900 INFO: task kworker/1:174:3550 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ba911000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3553 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3553 tgid:3553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0061d84 r8:00000002 r7:60000113 r6:e0061d8c r5:84ad1800 r4:84ad1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0061e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490b740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad1800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b4f8c r4:844b4c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b4f8c r4:848c4b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad1800 r8:848c4b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848c4b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c4b00 r8:80287e08 r7:e0045e60 r6:848c4b80 r5:84ad1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0061fb0 to 0xe0061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847dc100 INFO: task kworker/0:48:3553 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:175:3554 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:175 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0065d84 r8:00000002 r7:60000013 r6:e0065d8c r5:84bb4800 r4:84bb4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0065e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cd40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495938c r4:84959000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495938c r4:843b0180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb4800 r8:843b01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0180 r8:80287e08 r7:e005de60 r6:848c4c00 r5:84bb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0065fb0 to 0xe0065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433cc00 INFO: task kworker/1:175:3554 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:3556 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:3556 tgid:3556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e006dd84 r8:00000002 r7:60000113 r6:e006dd8c r5:84ad6c00 r4:84ad6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e006de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b871c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495a78c r4:8495a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495a78c r4:843b0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6c00 r8:843b022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0200 r8:80287e08 r7:e0065e60 r6:848c4c80 r5:84ad6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe006dfb0 to 0xe006dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433ccc0 INFO: task kworker/1:176:3556 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:3558 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:177 state:D stack:0 pid:3558 tgid:3558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0075d84 r8:00000002 r7:60000013 r6:e0075d8c r5:84a88c00 r4:84a88c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a88c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe65000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495978c r4:84959400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495978c r4:843b0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a88c00 r8:843b02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0280 r8:80287e08 r7:e006de60 r6:848c4d00 r5:84a88c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0075fb0 to 0xe0075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbf40 INFO: task kworker/1:177:3558 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bba4e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:178:3559 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:178 state:D stack:0 pid:3559 tgid:3559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0079d84 r8:00000002 r7:60000113 r6:e0079d8c r5:84a89800 r4:84a89800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a89800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0079e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbb40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a89800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84959b8c r4:84959800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84959b8c r4:843b0300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a89800 r8:843b032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0300 r8:80287e08 r7:e006de60 r6:848c4d80 r5:84a89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0079fb0 to 0xe0079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbf40 INFO: task kworker/1:178:3559 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bba4e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:3561 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:179 state:D stack:0 pid:3561 tgid:3561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0081d84 r8:00000002 r7:60000113 r6:e0081d8c r5:84a88000 r4:84a88000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a88000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cb80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a88000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe99000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84959f8c r4:84959c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84959f8c r4:843b0380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a88000 r8:843b03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0380 r8:80287e08 r7:e006de60 r6:848c4e00 r5:84a88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0081fb0 to 0xe0081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c0c0 INFO: task kworker/1:179:3561 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc0f3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:180:3563 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:180 state:D stack:0 pid:3563 tgid:3563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0049d84 r8:00000002 r7:60000113 r6:e0049d8c r5:84970000 r4:84970000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84970000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0049e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84970000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495a38c r4:8495a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495a38c r4:843b0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970000 r8:843b042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0400 r8:80287e08 r7:e006de60 r6:843b0480 r5:84970000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0049fb0 to 0xe0049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87140 INFO: task kworker/1:180:3563 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc0f3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:3566 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:3566 tgid:3566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0085d84 r8:00000002 r7:60000013 r6:e0085d8c r5:84971800 r4:84971800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84971800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84971800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff19000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495bb8c r4:8495b800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495bb8c r4:843b0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84971800 r8:843b052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0500 r8:80287e08 r7:e006de60 r6:843b0580 r5:84971800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0085fb0 to 0xe0085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87180 INFO: task kworker/1:181:3566 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc5c9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:3567 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:3567 tgid:3567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0035d84 r8:00000002 r7:60000113 r6:e0035d8c r5:84972400 r4:84972400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84972400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84972400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495ab8c r4:8495a800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495ab8c r4:843b0600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84972400 r8:843b062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0600 r8:80287e08 r7:e0085e60 r6:843b0680 r5:84972400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87180 INFO: task kworker/1:182:3567 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc797000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:183:3569 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:3569 tgid:3569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e008dd84 r8:00000002 r7:60000113 r6:e008dd8c r5:84973000 r4:84973000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84973000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84973000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495af8c r4:8495ac00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495af8c r4:843b0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84973000 r8:843b072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0700 r8:80287e08 r7:e0085e60 r6:843b0780 r5:84973000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe008dfb0 to 0xe008dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87480 INFO: task kworker/1:183:3569 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc797000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:3573 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:3573 tgid:3573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0091d84 r8:00000002 r7:60000013 r6:e0091d8c r5:84973c00 r4:84973c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84973c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0091e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84973c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfefb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495b38c r4:8495b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495b38c r4:843b0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84973c00 r8:843b082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0800 r8:80287e08 r7:e0085e60 r6:843b0880 r5:84973c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0091fb0 to 0xe0091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87600 INFO: task kworker/1:184:3573 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bcc8b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:3574 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:3574 tgid:3574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0099d84 r8:00000002 r7:60000013 r6:e0099d8c r5:84974800 r4:84974800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84974800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495b78c r4:8495b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495b78c r4:843b0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84974800 r8:843b092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0900 r8:80287e08 r7:e0085e60 r6:843b0980 r5:84974800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0099fb0 to 0xe0099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87700 INFO: task kworker/1:185:3574 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bccc3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:186:3576 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:186 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a1d84 r8:00000002 r7:60000113 r6:e00a1d8c r5:84975400 r4:84975400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84975400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84975400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff37000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495c38c r4:8495c000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495c38c r4:843b0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84975400 r8:843b0a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0a00 r8:80287e08 r7:e0085e60 r6:843b0a80 r5:84975400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a1fb0 to 0xe00a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87840 INFO: task kworker/1:186:3576 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bccc3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:3578 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:3578 tgid:3578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0095d84 r8:00000002 r7:60000113 r6:e0095d8c r5:84976000 r4:84976000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84976000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0095e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84976000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff25000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495bf8c r4:8495bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495bf8c r4:843b0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84976000 r8:843b0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0b00 r8:80287e08 r7:e00a1e60 r6:843b0b80 r5:84976000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0095fb0 to 0xe0095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87840 INFO: task kworker/1:187:3578 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bd2db000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:3580 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:3580 tgid:3580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a5d84 r8:00000002 r7:60000013 r6:e00a5d8c r5:84976c00 r4:84976c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84976c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84976c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff43000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495c78c r4:8495c400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495c78c r4:843b0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84976c00 r8:843b0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0c00 r8:80287e08 r7:e00a1e60 r6:843b0c80 r5:84976c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a5fb0 to 0xe00a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87b40 INFO: task kworker/1:188:3580 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bd2db000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:3582 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:3582 tgid:3582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a9d84 r8:00000002 r7:60000013 r6:e00a9d8c r5:84970c00 r4:84970c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84970c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84970c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00af000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495cb8c r4:8495c800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495cb8c r4:843b0d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970c00 r8:843b0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0d00 r8:80287e08 r7:e00a5e60 r6:843b0d80 r5:84970c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87d40 INFO: task kworker/1:189:3582 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bde2e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:3584 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:3584 tgid:3584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00add84 r8:00000002 r7:60000113 r6:e00add8c r5:84bbc800 r4:84bbc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00db000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495db8c r4:8495d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495db8c r4:843b0e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbc800 r8:843b0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0e00 r8:80287e08 r7:e00a9e60 r6:843b0e80 r5:84bbc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00adfb0 to 0xe00adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438c280 INFO: task kworker/1:190:3584 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bde2e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unm <<cut 6355896 bytes out>> jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:4850 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb35dd84 r8:00000002 r7:60000113 r6:eb35dd8c r5:85343000 r4:85343000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85343000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85343000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb029000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853af78c r4:853af400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853af78c r4:85387b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85343000 r8:85387b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387b00 r8:80287e08 r7:eb34de60 r6:85387b80 r5:85343000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: b474a000 dfafb000 00000001 80239b98 7f151000 00000001 r4:dff9ddc0 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:701:4853 blocked for more than 465 seconds. r10:8291a684 r9:eb359d84 r8:00000002 r7:60000113 r6:eb359d8c r5:85343c00 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85343c00 r8:85387c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387c00 r8:80287e08 r7:eb34de60 r6:85387c80 r5:85343c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85397b80 INFO: task kworker/1:701:4853 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b4bfd000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:85344800 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85344800 r8:85387d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r4:00000000 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:703:4856 blocked for more than 465 seconds. [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb099000 r5:853f038c r4:853f0000 r4:85387e00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:4858 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:4858 tgid:4858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb369d84 r8:00000002 r7:60000013 r6:eb369d8c r5:85345400 r4:85345400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85345400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85345400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f078c r4:853f0400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f078c r4:85387f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85345400 r8:85387f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387f00 r8:80287e08 r7:eb361e60 r6:85387f80 r5:85345400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e100 INFO: task kworker/1:704:4858 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b4f2e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:853f0b8c r4:853a2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535db8c r4:8535d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535db8c r4:8538b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85320000 r8:8538b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538b300 r8:80287e08 r7:eb1b9e60 r6:853a2100 r5:85320000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb375fb0 to 0xeb375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539d680 INFO: task kworker/0:164:4861 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b526b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:853f178c r4:853f1400 r4:853a2180 Exception stack(0xeb379fb0 to 0xeb379ff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:8483ac80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/1:707 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:85331800 r4:85331800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85331800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e980 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85331800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f138c r4:853f1000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f138c r4:853a2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85331800 r8:853a22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2280 r8:80287e08 r7:eb379e60 r6:853a2300 r5:85331800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e580 INFO: task kworker/1:707:4865 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b5acc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:dff9ddc0 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e072b000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b5acc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:4870 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:708 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853c6000 r4:8291a680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8539ea00 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b5acc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:709:4872 blocked for more than 465 seconds. r5:853c3000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:853f1f8c r4:853a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539eb80 INFO: task kworker/1:709:4872 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b62c7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:710 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ee00 r5:853f238c r4:853f2000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853a2480 r8:80287e08 r7:eb391e60 r6:853a2500 r5:85332400 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b62c7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:85333000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:853f278c r4:853a2580 r10:00000000 r9:853a2580 r8:80287e08 r7:eb381e60 r6:853a2600 r5:85333000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f2f8c r4:853f2c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f2f8c r4:853a2680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85333c00 r8:853a26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2680 r8:80287e08 r7:eb399e60 r6:853a2700 r5:85333c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb39dfb0 to 0xeb39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9100 INFO: task kworker/1:712:4879 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b653b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:4880 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853f2b8c r4:853a2780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:4884 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3add84 r8:00000002 r7:60000013 r6:eb3add8c r5:85336000 r4:85336000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85336000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9340 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85336000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3af000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f338c r4:853f3000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f338c r4:853a2980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85336000 r8:853a29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2980 r8:80287e08 r7:eb3a1e60 r6:853a2a00 r5:85336000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3adfb0 to 0xeb3adff8) dfa0: 00000000 00000000 00000000 00000000 r4:853a9240 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 r5:853f3f8c r4:853f3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:717:4887 blocked for more than 466 seconds. r4:85338c00 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a97c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85338c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f3b8c r4:853f3800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f3b8c r4:853a2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338c00 r8:853a2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2b80 r8:80287e08 r7:eb3bde60 r6:853a2c00 r5:85338c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9780 INFO: task kworker/1:717:4887 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b9d84 r8:00000002 r7:60000013 r6:eb3b9d8c r5:85339800 r4:85339800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85339800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539eec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85339800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e492b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540078c r4:85400400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540078c r4:853a2c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85339800 r8:853a2cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2c80 r8:80287e08 r7:eb3bde60 r6:853a2d00 r5:85339800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9980 INFO: task kworker/1:718:4890 is blocked on a mutex likely owned by task kworker/1:139:3474. r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:719 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3cdd84 r8:00000002 r7:60000113 r6:eb3cdd8c r5:8533b000 r4:8533b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9e00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8533b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0803000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540038c r4:85400000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540038c r4:853a2d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533b000 r8:853a2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2d80 r8:80287e08 r7:eb3b9e60 r6:853a2e00 r5:8533b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9b80 INFO: task kworker/1:719:4892 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b7965000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8533c800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:8540178c r4:85401400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85400f8c r4:85400c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85400f8c r4:853a2f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c2400 r8:853a2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2f80 r8:80287e08 r7:eb3d5e60 r6:8538b580 r5:853c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9b40 INFO: task kworker/1:721:4897 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b8078000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/0:166:4898 blocked for more than 466 seconds. r5:853c4800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8538b600 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 r5:00001000 r4:dfb17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b84a7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:4902 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:85420000 r4:85420000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85420000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:85402f8c r4:85402c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8538b780 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:723:4904 blocked for more than 466 seconds. r4:85421800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r7:ddde2d80 r6:83018200 r5:8540338c r4:853a4080 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cc480 INFO: task kworker/1:723:4904 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b8ea4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:4906 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85420c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r5:00001000 r4:eae31000 r5:85401b8c r4:85401800 r7:ddde2d80 r6:83018200 r5:85401b8c r4:853a4100 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:725:4908 blocked for more than 466 seconds. r4:85423c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:8483ac80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85423000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 r5:00001000 r4:eae8f000 r5:8540238c r4:85402000 r4:853a4200 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:4911 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:85424800 r4:85424800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85424800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc9c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540278c r4:85402400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540278c r4:853a4280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85424800 r8:853a42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4280 r8:80287e08 r7:eb3e9e60 r6:8538ba80 r5:85424800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:4914 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:4914 tgid:4914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85425400 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85402b8c r4:85402800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853a4300 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85426000 r8:853a43ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85426c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85426c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535eb8c r4:8535e800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535eb8c r4:8538bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85426c00 r8:8538bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538bc00 r8:80287e08 r7:eb1b9e60 r6:8538bc80 r5:85426c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438a700 INFO: task kworker/0:168:4918 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ba5a8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:4923 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb421d84 r8:00000002 r7:60000113 r6:eb421d8c r5:85346c00 r4:85346c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85346c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9ec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85346c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85403f8c r4:85403c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bd8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r9:83018205 r8:84bd8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r7:ddde2d80 r6:83018200 r5:8540438c r4:853a4500 r10:00000000 r9:853a4500 r8:80287e08 r7:eb421e60 r6:8538be00 r5:84bd8000 INFO: task kworker/1:732:4925 is blocked on a mutex likely owned by task kworker/1:139:3474. dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84bd8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb117000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540478c r4:85404400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540478c r4:853a4580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd8c00 r8:853a45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4580 r8:80287e08 r7:eb425e60 r6:8538be80 r5:84bd8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493b080 INFO: task kworker/1:733:4927 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bad8e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:84bd9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85404b8c r4:85404800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85404b8c r4:853a4600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd9800 r8:853a462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bda400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853a4680 r8:80287e08 r7:eb42de60 r6:8538bf80 r5:84bda400 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bb376000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:4933 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:84bdbc00 r4:84bdbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bdbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b640 r4:00000000 r5:00001000 r4:eb291000 r5:8540538c r4:85405000 r7:ddde2d80 r6:83018200 r5:8540538c r4:853a4700 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:dff9ddc0 r5:00001000 r4:dfb17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb441d84 r8:00000002 r7:60000113 r6:eb441d8c r5:84bdb000 r4:84bdb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bdb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85405b8c r4:85405800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85405b8c r4:853a4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bdb000 r8:853a47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4780 r8:80287e08 r7:eb439e60 r6:84817080 r5:84bdb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493b340 INFO: task kworker/1:737:4935 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bb7da000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdff9dfb0 to 0xdff9dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:84bde000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb2cb000 r5:8540578c r4:85405400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:dff9ddc0 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:84bdc800 r4:84bdc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bdc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85405f8c r4:85405c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85405f8c r4:853a4880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bdc800 r8:853a48ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4880 r8:80287e08 r7:eb441e60 r6:84817180 r5:84bdc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493b680 INFO: task kworker/1:739:4938 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bb7da000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:740:4940 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:740 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb455d84 r8:00000002 r7:60000013 r6:eb455d8c r5:853d8000 r4:853d8000 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8540638c r4:85406000 r7:ddde2d80 r6:83018200 r5:8540638c r4:853a4900 r10:00000000 r9:853a4900 r8:80287e08 r7:eb44de60 r6:84817200 r5:853d8000 INFO: task kworker/1:740:4940 is blocked on a mutex likely owned by task kworker/1:139:3474. Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8533ec00 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8540678c r4:85406400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540678c r4:853a4980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533ec00 r8:853a49ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4980 r8:80287e08 r7:eb455e60 r6:853a4a00 r5:8533ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb481fb0 to 0xeb481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493bf40 INFO: task kworker/1:741:4949 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bc8bb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:4950 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb485d84 r8:00000002 r7:60000013 r6:eb485d8c r5:8533bc00 r4:8533bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533bc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:8541d78c r4:8541d400 r10:61c88647 r9:8533bc00 r8:853a4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r4:00000000 r5:85406b8c r4:85406800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438a200 INFO: task kworker/1:743:4951 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bc8bb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:4952 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb48dd84 r8:00000002 r7:60000113 r6:eb48dd8c r5:8533d400 r4:8533d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493bd80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8533d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85406f8c r4:85406c00 r10:61c88647 r9:8533d400 r8:853a4cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdff9dfb0 to 0xdff9dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:85338000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952600 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85338000 r8:848172ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817280 r8:80287e08 r7:eb1b9e60 r6:853a4d80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849524c0 INFO: task kworker/0:169:4953 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bceaa000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:4954 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb495d84 r8:00000002 r7:60000013 r6:eb495d8c r5:85336c00 r4:85336c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85336c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493be80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85336c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540738c r4:85407000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540738c r4:853a4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85336c00 r8:853a4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4e00 r8:80287e08 r7:eb485e60 r6:853a4e80 r5:85336c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:853a4f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4f00 r8:80287e08 r7:eb485e60 r6:853a4f80 r5:85428c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb49dfb0 to 0xeb49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843981c0 INFO: task kworker/1:746:4956 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bd41c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:853d8c00 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:853d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:8535f38c r4:8535f000 r7:dddced80 r6:83018000 r5:8535f38c r4:84817300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:853db000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952c00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853db000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535fb8c r4:8535f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535fb8c r4:84817400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853db000 r8:8481742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817400 r8:80287e08 r7:eb1b9e60 r6:84817480 r5:853db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849528c0 INFO: task kworker/0:171:4959 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bd41c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:4960 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000113 r6:eb3c9d8c r5:853dbc00 r4:853dbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaffb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535ff8c r4:8535fc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535ff8c r4:84817500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dbc00 r8:8481752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817500 r8:80287e08 r7:eb4a1e60 r6:84817580 r5:853dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849528c0 INFO: task kworker/0:172:4960 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bd8ba000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 r5:84af538c r4:84af5000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84817600 r8:80287e08 r7:eb3c9e60 r6:84817680 r5:853dd400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:853de000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r9:83018005 r8:853de000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:84af578c r4:84af5400 r10:61c88647 r9:853de000 r8:8481772c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bdf00000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:747:4968 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:747 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:85428000 r4:85428000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85428000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84398900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb243000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85407b8c r4:85407800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r5:80050013 r4:80239bb0 r4:dff9ddc0 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000013 r6:eb4b1d8c r5:8542b000 r4:8542b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493bf00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb157000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545838c r4:85458000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545838c r4:84817800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542b000 r8:8481782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817800 r8:80287e08 r7:eb4a5e60 r6:84ae1100 r5:8542b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84952b00 INFO: task kworker/0:175:4970 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: be67c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:4972 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r5:00001000 r4:eb0ab000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8542bc00 r8:848178ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853d9800 r8:8481792c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb499fb0 to 0xeb499ff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r4:dff9ddc0 r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4976 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:853dec00 r4:853dec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f3c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85458b8c r4:85458800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85458b8c r4:84817a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dec00 r8:84817a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817a00 r8:80287e08 r7:eb499e60 r6:84817a80 r5:853dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4bdfb0 to 0xeb4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490f1c0 INFO: task kworker/0:178:4976 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bf11f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb225000 r5:8545938c r4:85459000 r10:61c88647 r9:8533e000 r8:84817b2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 task:kworker/0:180 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c5d84 r8:00000002 r7:60000013 r6:eb4c5d8c r5:84bdec00 r4:84bdec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bdec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bdec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85458f8c r4:85458c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85458f8c r4:84817c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bdec00 r8:84817c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817c00 r8:80287e08 r7:eb4c1e60 r6:84817c80 r5:84bdec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c5fb0 to 0xeb4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490f840 INFO: task kworker/0:180:4980 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bf2fb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4982 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84817d00 r8:80287e08 r7:eb4c1e60 r6:84817d80 r5:853da400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:182:4983 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:182 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:853dc800 r4:853dc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490fc00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85459b8c r4:85459800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85459b8c r4:84817e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dc800 r8:84817e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817e00 r8:80287e08 r7:eb4c9e60 r6:84817e80 r5:853dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490f6c0 INFO: task kworker/0:182:4983 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bf8bf000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85459f8c r4:85459c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8490fcc0 Call trace: r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bfe74000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:4988 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:4988 tgid:4988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:853e1800 r4:853e1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0400000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:748 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a600 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85407f8c r4:84ae1200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:185:4992 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e5d84 r8:00000002 r7:60000113 r6:eb4e5d8c r5:8542ec00 r4:8542ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490ff40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545a38c r4:8545a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545a38c r4:8438d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542ec00 r8:8438d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d100 r8:80287e08 r7:eb4b9e60 r6:84ae1300 r5:8542ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490f180 INFO: task kworker/0:185:4992 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0400000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8438d180 r8:80287e08 r7:eb4b9e60 r6:84ae1380 r5:8542d400 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:4995 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4fdd84 r8:00000002 r7:60000113 r6:eb4fdd8c r5:8542a400 r4:8542a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8542a400 r8:8438d22c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: c0985000 dfafb000 00000001 80239b98 7f151000 00000001 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 r4:8542e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542e000 r4:8291a680 r10:00000000 r9:8438d280 r8:80287e08 r7:eb4b9e60 r6:84ae1480 r5:8542e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb505fb0 to 0xeb505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67180 INFO: task kworker/0:188:4997 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0985000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:4999 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:85430c00 r4:85430c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85430c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b673c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85430c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545b38c r4:8545b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545b38c r4:8438d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85430c00 r8:8438d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d300 r8:80287e08 r7:eb4b9e60 r6:84ae1500 r5:85430c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67280 INFO: task kworker/0:189:4999 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0f97000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:5001 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:85430000 r4:85430000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85430000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b675c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85430000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb523000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545b78c r4:8545b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545b78c r4:8438d380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85430000 r8:8438d3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d380 r8:80287e08 r7:eb4b9e60 r6:84ae1580 r5:85430000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67400 INFO: task kworker/0:190:5001 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0f97000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:5004 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:85431800 r4:85431800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85431800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85431800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545bf8c r4:8545bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545bf8c r4:8438d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85431800 r8:8438d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d400 r8:80287e08 r7:eb4b9e60 r6:84ae1600 r5:85431800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67500 INFO: task kworker/0:191:5004 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c14d4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:5005 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:85433c00 r4:85433c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85433c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67a00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85433c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546078c r4:85460400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546078c r4:8438d480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85433c00 r8:8438d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d480 r8:80287e08 r7:eb539e60 r6:84ae1680 r5:85433c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67640 INFO: task kworker/0:192:5005 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c15ae000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:5007 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:85434800 r4:85434800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85434800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85434800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb545000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546038c r4:85460000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546038c r4:8438d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85434800 r8:8438d52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d500 r8:80287e08 r7:eb53de60 r6:84ae1700 r5:85434800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67780 INFO: task kworker/0:193:5007 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c15ae000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:5009 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb559d84 r8:00000002 r7:60000013 r6:eb559d8c r5:85433000 r4:85433000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85433000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67b40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85433000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb561000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85460b8c r4:85460800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85460b8c r4:8438d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85433000 r8:8438d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d580 r8:80287e08 r7:eb53de60 r6:84ae1780 r5:85433000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67640 INFO: task kworker/0:194:5009 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c20a3000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:5012 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:5012 tgid:5012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:85435400 r4:85435400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85435400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67d40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85435400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb573000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85460f8c r4:85460c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85460f8c r4:8438d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85435400 r8:8438d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d600 r8:80287e08 r7:eb559e60 r6:84ae1800 r5:85435400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67a40 INFO: task kworker/0:195:5012 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c20a3000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:5014 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:5014 tgid:5014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:85432400 r4:85432400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85432400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84398c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85432400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb587000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546178c r4:85461400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546178c r4:8438d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85432400 r8:8438d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d680 r8:80287e08 r7:eb571e60 r6:84ae1880 r5:85432400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67c80 INFO: task kworker/0:196:5014 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c20a3000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:5015 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:85436c00 r4:85436c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85436c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67ec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85436c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb579000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546138c r4:85461000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546138c r4:8438d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85436c00 r8:8438d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d700 r8:80287e08 r7:eb57de60 r6:84ae1900 r5:85436c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67c80 INFO: task kworker/0:197:5015 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c20a3000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:198:5018 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:198 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:85429800 r4:85429800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85429800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85429800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546238c r4:85462000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546238c r4:8438d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85429800 r8:8438d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d780 r8:80287e08 r7:eb57de60 r6:84ae1980 r5:85429800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84398e00 INFO: task kworker/0:198:5018 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c24d7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:5019 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:85438000 r4:85438000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f1c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85438000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85461b8c r4:85461800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85461b8c r4:8438d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438000 r8:8438d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d800 r8:80287e08 r7:eb595e60 r6:84ae1a00 r5:85438000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84398e00 INFO: task kworker/0:199:5019 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c29a9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:5022 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:5022 tgid:5022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000113 r6:eb5b1d8c r5:8543a400 r4:8543a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849520c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85461f8c r4:85461c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85461f8c r4:8438d880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543a400 r8:8438d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d880 r8:80287e08 r7:eb595e60 r6:84ae1a80 r5:8543a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84952200 INFO: task kworker/0:200:5022 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c29a9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:201:5024 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5bdd84 r8:00000002 r7:60000113 r6:eb5bdd8c r5:85438c00 r4:85438c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f1c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85438c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546278c r4:85462400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546278c r4:8438d900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438c00 r8:8438d92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d900 r8:80287e08 r7:eb595e60 r6:84ae1b00 r5:85438c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f100 INFO: task kworker/0:201:5024 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c2d8d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:202:5026 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:202 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:85439800 r4:85439800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85439800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85439800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85462b8c r4:85462800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85462b8c r4:8438d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85439800 r8:8438d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d980 r8:80287e08 r7:eb5bde60 r6:84ae1b80 r5:85439800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f180 INFO: task kworker/0:202:5026 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c318c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:5027 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000113 r6:eb5d5d8c r5:8543b000 r4:8543b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85462f8c r4:85462c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85462f8c r4:8438da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543b000 r8:8438da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438da00 r8:80287e08 r7:eb5cde60 r6:84ae1c00 r5:8543b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f440 INFO: task kworker/0:203:5027 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c318c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5030 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:5030 tgid:5030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:8543c800 r4:8543c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f4c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546338c r4:85463000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546338c r4:84ae1c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543c800 r8:84ae1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae1c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae1c80 r8:80287e08 r7:eb485e60 r6:84ae1d00 r5:8543c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8492a340 INFO: task kworker/1:749:5030 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c330c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:5031 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5e1d84 r8:00000002 r7:60000113 r6:eb5e1d8c r5:8543d400 r4:8543d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546378c r4:85463400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546378c r4:8438da80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543d400 r8:8438daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438da80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438da80 r8:80287e08 r7:eb5d5e60 r6:84ae1d80 r5:8543d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f380 INFO: task kworker/0:204:5031 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c330c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:5034 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:8543bc00 r4:8543bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541c38c r4:8541c000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541c38c r4:84ae1e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543bc00 r8:84ae1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae1e00 r8:80287e08 r7:eb485e60 r6:84ae1e80 r5:8543bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8492ae80 INFO: task kworker/1:750:5034 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c3602000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:5036 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:5036 tgid:5036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb609d84 r8:00000002 r7:60000113 r6:eb609d8c r5:8543ec00 r4:8543ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f7c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ff000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85463b8c r4:85463800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85463b8c r4:8438db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543ec00 r8:8438db2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438db00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438db00 r8:80287e08 r7:eb5e1e60 r6:84ae1f00 r5:8543ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f6c0 INFO: task kworker/0:205:5036 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c3602000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:5038 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:854c8000 r4:854c8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae3200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85464b8c r4:85464800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85464b8c r4:8438db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c8000 r8:8438dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438db80 r8:80287e08 r7:eb609e60 r6:84ae1f80 r5:854c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f6c0 INFO: task kworker/0:206:5038 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c3602000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:5039 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:854c8c00 r4:854c8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fa00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb605000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85463f8c r4:85463c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85463f8c r4:8438dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c8c00 r8:8438dc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438dc00 r8:80287e08 r7:eb611e60 r6:85382000 r5:854c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f6c0 INFO: task kworker/0:207:5039 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c3cb6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:5041 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:853e2400 r4:853e2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fb00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546438c r4:85464000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546438c r4:8438dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e2400 r8:8438dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438dc80 r8:80287e08 r7:eb611e60 r6:8438dd00 r5:853e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f9c0 INFO: task kworker/0:208:5041 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c40cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:5045 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000013 r6:eb62dd8c r5:853e4800 r4:853e4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541c78c r4:8541c400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541c78c r4:85382080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e4800 r8:853820ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382080 r8:80287e08 r7:eb485e60 r6:8438dd80 r5:853e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386780 INFO: task kworker/1:751:5045 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c40cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:5047 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:853e5400 r4:853e5400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e5400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae67000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541df8c r4:8541dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8541df8c r4:8438de00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e5400 r8:8438de2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438de00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438de00 r8:80287e08 r7:eb611e60 r6:8438de80 r5:853e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538fc00 INFO: task kworker/0:209:5047 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c40cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5048 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb639d84 r8:00000002 r7:60000013 r6:eb639d8c r5:853e6c00 r4:853e6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853867c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0799000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541cb8c r4:8541c800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541cb8c r4:85382100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6c00 r8:8538212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382100 r8:80287e08 r7:eb485e60 r6:8438df00 r5:853e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386640 INFO: task kworker/1:752:5048 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c40cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5050 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:853e6000 r4:853e6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0861000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541cf8c r4:8541cc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541cf8c r4:85382180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6000 r8:853821ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382180 r8:80287e08 r7:eb485e60 r6:8438df80 r5:853e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386a40 INFO: task kworker/1:753:5050 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c46ac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:5052 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:853e0000 r4:853e0000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386a00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541d38c r4:8541d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541d38c r4:85382200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0000 r8:8538222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382200 r8:80287e08 r7:eb485e60 r6:8538d000 r5:853e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386b00 INFO: task kworker/1:754:5052 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c46ac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:755:5054 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:755 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb651d84 r8:00000002 r7:60000013 r6:eb651d8c r5:853e3000 r4:853e3000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492ad00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541e78c r4:8541e400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e78c r4:85382300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3000 r8:8538232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382300 r8:80287e08 r7:eb485e60 r6:8538d080 r5:853e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386c40 INFO: task kworker/1:755:5054 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4804000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5056 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb659d84 r8:00000002 r7:60000013 r6:eb659d8c r5:853e3c00 r4:853e3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541db8c r4:8541d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541db8c r4:85382280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3c00 r8:853822ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382280 r8:80287e08 r7:eb651e60 r6:8538d100 r5:853e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386bc0 INFO: task kworker/1:756:5056 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4804000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5059 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb629d84 r8:00000002 r7:60000013 r6:eb629d8c r5:85490000 r4:85490000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85490000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85490000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae99000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541e38c r4:8541e000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e38c r4:85382380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85490000 r8:853823ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382380 r8:80287e08 r7:eb651e60 r6:8538d200 r5:85490000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386e40 INFO: task kworker/1:757:5059 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4af2000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:5060 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:85490c00 r4:85490c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85490c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853925c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85490c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546478c r4:85464400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546478c r4:8538d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85490c00 r8:8538d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538d180 r8:80287e08 r7:eb611e60 r6:8538d280 r5:85490c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85392240 INFO: task kworker/0:210:5060 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4ee6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5062 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb661d84 r8:00000002 r7:60000013 r6:eb661d8c r5:85491800 r4:85491800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85491800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b8c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85491800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541ef8c r4:8541ec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ef8c r4:85382400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85491800 r8:8538242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382400 r8:80287e08 r7:eb651e60 r6:8538d300 r5:85491800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb661fb0 to 0xeb661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386e40 INFO: task kworker/1:758:5062 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4fa9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5065 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5065 tgid:5065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:85492400 r4:85492400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85492400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f400 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85492400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaefd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541eb8c r4:8541e800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541eb8c r4:85382480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85492400 r8:853824ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382480 r8:80287e08 r7:eb661e60 r6:8538d380 r5:85492400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538fbc0 INFO: task kworker/1:759:5065 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4fa9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:760:5068 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:760 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:85493000 r4:85493000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85493000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb119000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541f78c r4:8541f400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541f78c r4:85382500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85493000 r8:8538252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382500 r8:80287e08 r7:eb661e60 r6:8538d400 r5:85493000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538fdc0 INFO: task kworker/1:760:5068 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c56b8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5071 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:85495400 r4:85495400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85495400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853863c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85495400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541f38c r4:8541f000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541f38c r4:85382580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85495400 r8:853825ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382580 r8:80287e08 r7:eb61de60 r6:8538d580 r5:85495400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8492a040 INFO: task kworker/1:761:5071 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c56b8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5073 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:85496c00 r4:85496c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85496c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398180 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85496c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb145000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541fb8c r4:8541f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541fb8c r4:85382600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85496c00 r8:8538262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382600 r8:80287e08 r7:eb61de60 r6:8538d600 r5:85496c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853980c0 INFO: task kworker/1:762:5073 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c5bfa000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:763:5075 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:763 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb655d84 r8:00000002 r7:60000013 r6:eb655d8c r5:854cb000 r4:854cb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550038c r4:85500000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550038c r4:85382680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cb000 r8:853826ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382680 r8:80287e08 r7:eb679e60 r6:85382700 r5:854cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398140 INFO: task kworker/1:763:5075 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c5bfa000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5077 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:854cbc00 r4:854cbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541ff8c r4:8541fc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ff8c r4:85382780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cbc00 r8:853827ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382780 r8:80287e08 r7:eb655e60 r6:85382800 r5:854cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398140 INFO: task kworker/1:764:5077 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c5f3f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:765:5079 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:765 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb689d84 r8:00000002 r7:60000113 r6:eb689d8c r5:84968000 r4:84968000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84968000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550078c r4:85500400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550078c r4:85382880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968000 r8:853828ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382880 r8:80287e08 r7:eb655e60 r6:8538d680 r5:84968000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398440 INFO: task kworker/1:765:5079 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c5f3f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5081 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:84969800 r4:84969800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84969800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853989c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550138c r4:85501000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550138c r4:85382900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84969800 r8:8538292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382900 r8:80287e08 r7:eb689e60 r6:8538d700 r5:84969800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398580 INFO: task kworker/1:766:5081 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6394000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5082 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5082 tgid:5082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb695d84 r8:00000002 r7:60000113 r6:eb695d8c r5:8496a400 r4:8496a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85500b8c r4:85500800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85500b8c r4:85382a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496a400 r8:85382a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382a00 r8:80287e08 r7:eb691e60 r6:8538d780 r5:8496a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398800 INFO: task kworker/1:767:5082 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6394000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5084 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:84968c00 r4:84968c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84968c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853986c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85500f8c r4:85500c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85500f8c r4:85382a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968c00 r8:85382aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382a80 r8:80287e08 r7:eb691e60 r6:8538d800 r5:84968c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398940 INFO: task kworker/1:768:5084 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5088 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:8496d400 r4:8496d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398b40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550178c r4:85501400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550178c r4:85382b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496d400 r8:85382b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382b00 r8:80287e08 r7:eb6a5e60 r6:8538d900 r5:8496d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853988c0 INFO: task kworker/1:770:5088 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:771:5090 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:771 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:8496ec00 r4:8496ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb445000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85501b8c r4:85501800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85501b8c r4:85382b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496ec00 r8:85382bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382b80 r8:80287e08 r7:eb6a5e60 r6:8538d980 r5:8496ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398bc0 INFO: task kworker/1:771:5090 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00050113 r5:60050193 r4:82257d54 [<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<80220048>] (dump_stack) from [<81a3cdcc>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a3cc6c>] (nmi_cpu_backtrace) from [<81a3cf18>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c610 r5:8281af00 r4:ffffffff [<81a3cde8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:0000e6cb r8:82ab6564 r7:8280c788 r6:00007766 r5:8281b4c8 r4:85e1320c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:80386900 r7:8329e300 r6:8329e300 r5:832dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8338a0c0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2819 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a5bfec>] lr : [<80a629ec>] psr: 60050013 sp : ebe09eb0 ip : ebe09ec0 fp : ebe09ebc r10: 8295b3bc r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295b320 r5 : 00000000 r4 : 00000001 r3 : 0000b35d r2 : 00000000 r1 : 60050013 r0 : 83327c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 847d9040 DAC: fffffffd Call trace: [<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a629cc>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c610 r5:83c78000 r4:8295b320 [<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295b320 r8:802efd8c r7:84252b00 r6:84252b00 r5:83c78000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe09fb0 to 0xebe09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842cbc80