INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:83236000 r4:83236000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84379f8c r4:84379c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84379f8c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:df819e48 r6:830b8480 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b51c0 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: adac4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:4:3046 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3046 tgid:3046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7a9d84 r8:00000002 r7:60000113 r6:ec7a9d8c r5:84543000 r4:84543000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84543000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84832280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84543000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84901f8c r4:84901c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84901f8c r4:847d1080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84543000 r8:847d10ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847d1080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d1080 r8:80287e08 r7:df841e60 r6:84795300 r5:84543000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a9fb0 to 0xec7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84309ec0 INFO: task kworker/0:4:3046 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ae9b9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/1:0:3110 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3110 tgid:3110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9a9d84 r8:00000002 r7:60000013 r6:df9a9d8c r5:84156000 r4:84156000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84156000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84156000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852df78c r4:852df400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852df78c r4:84795800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84156000 r8:8479582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84795800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84795800 r8:80287e08 r7:eaf51e60 r6:84795a00 r5:84156000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8338ea40 INFO: task kworker/1:0:3110 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: af95b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:5:3114 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3114 tgid:3114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:84543c00 r4:84543c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84543c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84543c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0113000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b5b8c r4:844b5800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b5b8c r4:847e2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84543c00 r8:847e222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2200 r8:80287e08 r7:ec7a9e60 r6:84795980 r5:84543c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83902840 INFO: task kworker/0:5:3114 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: af95b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:6:3118 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:84156c00 r4:84156c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84156c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84936c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84156c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb83000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b678c r4:844b6400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b678c r4:847e2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84156c00 r8:847e22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2280 r8:80287e08 r7:ec7a9e60 r6:84795c80 r5:84156c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842f4d00 INFO: task kworker/0:6:3118 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: afda0000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:7:3120 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:84542400 r4:84542400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84542400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953400 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84542400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84395f8c r4:84395c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84395f8c r4:847e2300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84542400 r8:847e232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2300 r8:80287e08 r7:ec7a9e60 r6:84795c00 r5:84542400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848320c0 INFO: task kworker/0:7:3120 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b031f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:8:3123 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:841abc00 r4:841abc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841abc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df965000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84900b8c r4:84900800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84900b8c r4:847e2380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841abc00 r8:847e23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2380 r8:80287e08 r7:ec7a9e60 r6:84795e00 r5:841abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832140 INFO: task kworker/0:8:3123 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b031f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:9:3124 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df96dd84 r8:00000002 r7:60000113 r6:df96dd8c r5:84579800 r4:84579800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84579800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84579800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd55000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848ba38c r4:848ba000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:848ba38c r4:847e2400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84579800 r8:847e242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2400 r8:80287e08 r7:ec7a9e60 r6:847e2480 r5:84579800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf96dfb0 to 0xdf96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832280 INFO: task kworker/0:9:3124 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b05c7000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:10:3127 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:84578c00 r4:84578c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84578c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493a8c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84578c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a878c r4:850a8400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a878c r4:847e2500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84578c00 r8:847e252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2500 r8:80287e08 r7:ec7a9e60 r6:847e2580 r5:84578c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832500 INFO: task kworker/0:10:3127 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b089c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 INFO: task kworker/0:11:3128 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df975d84 r8:00000002 r7:60000113 r6:df975d8c r5:8457d400 r4:8457d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df975e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cac80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd73000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84903f8c r4:84903c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84903f8c r4:847e2600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457d400 r8:847e262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2600 r8:80287e08 r7:df9f5e60 r6:847e2680 r5:8457d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf975fb0 to 0xdf975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832800 INFO: task kworker/0:11:3128 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b0d70000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3131 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:8457c800 r4:8457c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ea000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a9b8c r4:850a9800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a9b8c r4:847e2700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457c800 r8:847e272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2700 r8:80287e08 r7:df9f5e60 r6:847e2780 r5:8457c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832780 INFO: task kworker/0:12:3131 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1219000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3133 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:8457ec00 r4:8457ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4f80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c738c r4:851c7000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c738c r4:847e2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457ec00 r8:847e282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2800 r8:80287e08 r7:dfa15e60 r6:847e2880 r5:8457ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832900 INFO: task kworker/0:13:3133 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1219000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3135 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:8457a400 r4:8457a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8457a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fd80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8457a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe27000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ab38c r4:850ab000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ab38c r4:847e2900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8457a400 r8:847e292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2900 r8:80287e08 r7:dfa29e60 r6:847e2980 r5:8457a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832a80 INFO: task kworker/0:14:3135 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1219000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3137 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83236c00 r4:83236c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8e80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa03000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d538c r4:851d5000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d538c r4:847e2a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236c00 r8:847e2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2a00 r8:80287e08 r7:dfa29e60 r6:847e2a80 r5:83236c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832c00 INFO: task kworker/0:15:3137 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1a6e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3139 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:832fec00 r4:832fec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832fec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539d140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf71000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535d38c r4:8535d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535d38c r4:847e2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832fec00 r8:847e2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2b00 r8:80287e08 r7:dfa3de60 r6:847e2b80 r5:832fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832dc0 INFO: task kworker/0:16:3139 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1a6e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3140 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa1dd84 r8:00000002 r7:60000013 r6:dfa1dd8c r5:832f8000 r4:832f8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832f8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852489c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d6b8c r4:851d6800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d6b8c r4:847e2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f8000 r8:847e2c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2c00 r8:80287e08 r7:dfa45e60 r6:847e2c80 r5:832f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8431b280 INFO: task kworker/0:17:3140 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1fce000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3142 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:832fe000 r4:832fe000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832fe000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d50c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af4b8c r4:84af4800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af4b8c r4:847e2d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832fe000 r8:847e2d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2d00 r8:80287e08 r7:dfa45e60 r6:847e2d80 r5:832fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845deac0 INFO: task kworker/0:18:3142 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b1fce000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3146 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:832f9800 r4:832f9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832f9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539de40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0607000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535df8c r4:8535dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535df8c r4:847e2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832f9800 r8:847e2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2e00 r8:80287e08 r7:dfa45e60 r6:847e2e80 r5:832f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3a380 INFO: task kworker/0:19:3146 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b21d9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa95d84 r8:00000002 r7:60000013 r6:dfa95d8c r5:841ae000 r4:841ae000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ae000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa55000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535e78c r4:8535e400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535e78c r4:847e2f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ae000 r8:847e2fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847e2f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2f80 r8:80287e08 r7:dfa8de60 r6:84795d00 r5:841ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3a340 INFO: task kworker/0:21:3151 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b29da000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3447 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3447 tgid:3447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dff21d84 r8:00000002 r7:60000113 r6:dff21d8c r5:84b41800 r4:84b41800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b41800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff21e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b41800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b638c r4:844b6000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b638c r4:84944180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b41800 r8:849441ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84944180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944180 r8:80287e08 r7:dfb39e60 r6:84944200 r5:84b41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff21fb0 to 0xdff21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84951940 INFO: task kworker/0:43:3447 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b29da000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3450 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3450 tgid:3450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdbdd84 r8:00000002 r7:60000113 r6:dfdbdd8c r5:84b43c00 r4:84b43c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b43c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdbde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae2040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b43c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84affb8c r4:84aff800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84affb8c r4:84944380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b43c00 r8:849443ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84944380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944380 r8:80287e08 r7:dff21e60 r6:84944400 r5:84b43c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdbdfb0 to 0xdfdbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84951b80 INFO: task kworker/0:45:3450 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b2a82000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:138:3472 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:3472 tgid:3472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dff95d84 r8:00000002 r7:60000113 r6:dff95d8c r5:848e4800 r4:848e4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84954f8c r4:84954c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84954f8c r4:8483ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e4800 r8:8483ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac00 r8:80287e08 r7:dff71e60 r6:84944980 r5:848e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff95fb0 to 0xdff95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839940 INFO: task kworker/1:138:3472 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b2f3c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:139:3474 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dff9dd84 r8:00000002 r7:60000013 r6:dff9dd8c r5:848e3c00 r4:848e3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff9de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 INFO: task kworker/1:139:3474 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b323b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:3476 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:3476 tgid:3476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffa5d84 r8:00000002 r7:60000113 r6:dffa5d8c r5:848e6000 r4:848e6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839bc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553f8c r4:84553c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553f8c r4:8483ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e6000 r8:8483ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ad00 r8:80287e08 r7:dff95e60 r6:84944a80 r5:848e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffa5fb0 to 0xdffa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839e80 INFO: task kworker/1:140:3476 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b34d6000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:3478 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:3478 tgid:3478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffadd84 r8:00000002 r7:60000113 r6:dffadd8c r5:848e6c00 r4:848e6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495438c r4:84954000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495438c r4:8483ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e6c00 r8:8483adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ad80 r8:80287e08 r7:dff95e60 r6:84944b00 r5:848e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffadfb0 to 0xdffadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839d00 INFO: task kworker/1:141:3478 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b34d6000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:3480 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:3480 tgid:3480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffb5d84 r8:00000002 r7:60000113 r6:dffb5d8c r5:848e0000 r4:848e0000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e0000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcaf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495478c r4:84954400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495478c r4:8483ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0000 r8:8483ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ae00 r8:80287e08 r7:dff95e60 r6:84944b80 r5:848e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb5fb0 to 0xdffb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84951580 INFO: task kworker/1:142:3480 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b392d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:143:3482 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:143 state:D stack:0 pid:3482 tgid:3482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffbdd84 r8:00000002 r7:60000013 r6:dffbdd8c r5:84b50c00 r4:84b50c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b50c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffbde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483bac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b50c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84954b8c r4:84954800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84954b8c r4:8483ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b50c00 r8:8483aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ae80 r8:80287e08 r7:dff95e60 r6:84944c00 r5:84b50c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffbdfb0 to 0xdffbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839ec0 INFO: task kworker/1:143:3482 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b3de2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:3485 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:3485 tgid:3485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffc5d84 r8:00000002 r7:60000113 r6:dffc5d8c r5:84b52400 r4:84b52400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b52400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b52400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd3d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495578c r4:84955400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495578c r4:8483af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b52400 r8:8483af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483af00 r8:80287e08 r7:dff95e60 r6:84944c80 r5:84b52400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc5fb0 to 0xdffc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6100 INFO: task kworker/1:144:3485 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b3de2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:145:3486 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:145 state:D stack:0 pid:3486 tgid:3486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffc9d84 r8:00000002 r7:60000113 r6:dffc9d8c r5:84b53000 r4:84b53000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b53000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffc9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b53000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd2b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495538c r4:84955000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495538c r4:8483af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b53000 r8:8483afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483af80 r8:80287e08 r7:dffc5e60 r6:84944d00 r5:84b53000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffc9fb0 to 0xdffc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6100 INFO: task kworker/1:145:3486 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b4659000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:146:3488 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:3488 tgid:3488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffd1d84 r8:00000002 r7:60000113 r6:dffd1d8c r5:84b54800 r4:84b54800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b54800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b54800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd45000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84955b8c r4:84955800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84955b8c r4:84bf7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b54800 r8:84bf702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7000 r8:80287e08 r7:dffc5e60 r6:84944d80 r5:84b54800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd1fb0 to 0xdffd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf61c0 INFO: task kworker/1:146:3488 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b4889000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:3490 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:3490 tgid:3490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffd9d84 r8:00000002 r7:60000113 r6:dffd9d8c r5:84b53c00 r4:84b53c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b53c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd53000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84955f8c r4:84955c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84955f8c r4:84bf7080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b53c00 r8:84bf70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7080 r8:80287e08 r7:dffd1e60 r6:84944e00 r5:84b53c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffd9fb0 to 0xdffd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6280 INFO: task kworker/1:147:3490 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b4c07000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:148:3492 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:148 state:D stack:0 pid:3492 tgid:3492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffe1d84 r8:00000002 r7:60000013 r6:dffe1d8c r5:84b56000 r4:84b56000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b56000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b56000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd71000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495678c r4:84956400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495678c r4:84bf7100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b56000 r8:84bf712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7100 r8:80287e08 r7:dffd9e60 r6:84944e80 r5:84b56000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe1fb0 to 0xdffe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf63c0 INFO: task kworker/1:148:3492 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b4f66000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:149:3496 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:149 state:D stack:0 pid:3496 tgid:3496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffb9d84 r8:00000002 r7:60000113 r6:dffb9d8c r5:84b51800 r4:84b51800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b51800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffb9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6980 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b51800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84956f8c r4:84956c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84956f8c r4:84bf7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b51800 r8:84bf75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7580 r8:80287e08 r7:dffe1e60 r6:84944f00 r5:84b51800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffb9fb0 to 0xdffb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6740 INFO: task kworker/1:149:3496 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5286000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3497 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3497 tgid:3497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffe5d84 r8:00000002 r7:60000113 r6:dffe5d8c r5:84b56c00 r4:84b56c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b56c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c3040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc43000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437bb8c r4:8437b800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8437bb8c r4:84944f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b56c00 r8:84944fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84944f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84944f80 r8:80287e08 r7:dff21e60 r6:848c4000 r5:84b56c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffe5fb0 to 0xdffe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ae2e80 INFO: task kworker/0:46:3497 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5286000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:150:3499 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:150 state:D stack:0 pid:3499 tgid:3499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffedd84 r8:00000002 r7:60000013 r6:dffedd8c r5:84b50000 r4:84b50000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b50000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffede08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6880 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b50000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd7d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84956b8c r4:84956800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84956b8c r4:84bf7600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b50000 r8:84bf762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7600 r8:80287e08 r7:dffb9e60 r6:848c4080 r5:84b50000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffedfb0 to 0xdffedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6800 INFO: task kworker/1:150:3499 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5898000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:3501 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:3501 tgid:3501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfff5d84 r8:00000002 r7:60000113 r6:dfff5d8c r5:84b55400 r4:84b55400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b55400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbbc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b55400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437a78c r4:8437a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437a78c r4:84bf7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b55400 r8:84bf76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7680 r8:80287e08 r7:dffb9e60 r6:848c4100 r5:84b55400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff5fb0 to 0xdfff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6c00 INFO: task kworker/1:151:3501 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5c23000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:152:3502 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:3502 tgid:3502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfff9d84 r8:00000002 r7:60000113 r6:dfff9d8c r5:84ba8000 r4:84ba8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfff9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba8000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495738c r4:84957000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495738c r4:84bf7700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba8000 r8:84bf772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7700 r8:80287e08 r7:dfff5e60 r6:848c4180 r5:84ba8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfff9fb0 to 0xdfff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6c00 INFO: task kworker/1:152:3502 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b5c23000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:153:3504 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:153 state:D stack:0 pid:3504 tgid:3504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0001d84 r8:00000002 r7:60000013 r6:e0001d8c r5:84ba9800 r4:84ba9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0001e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495778c r4:84957400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495778c r4:84bf7780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba9800 r8:84bf77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7780 r8:80287e08 r7:dfff5e60 r6:848c4200 r5:84ba9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0001fb0 to 0xe0001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6a80 INFO: task kworker/1:153:3504 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b631a000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:154:3506 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:154 state:D stack:0 pid:3506 tgid:3506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0009d84 r8:00000002 r7:60000113 r6:e0009d8c r5:84ba8c00 r4:84ba8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84957b8c r4:84957800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84957b8c r4:84bf7880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba8c00 r8:84bf78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7880 r8:80287e08 r7:dfff5e60 r6:848c4280 r5:84ba8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0009fb0 to 0xe0009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6b80 INFO: task kworker/1:154:3506 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b689b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:155:3508 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:3508 tgid:3508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0011d84 r8:00000002 r7:60000113 r6:e0011d8c r5:84baa400 r4:84baa400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84baa400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0011e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6e40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84baa400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84957f8c r4:84957c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84957f8c r4:84bf7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84baa400 r8:84bf782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7800 r8:80287e08 r7:dfff5e60 r6:848c4300 r5:84baa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0011fb0 to 0xe0011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf6d40 INFO: task kworker/1:155:3508 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b6c53000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:3510 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:3510 tgid:3510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0019d84 r8:00000002 r7:60000113 r6:e0019d8c r5:84bab000 r4:84bab000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bab000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0019e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bab000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495638c r4:84956000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495638c r4:84bf7900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bab000 r8:84bf792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7900 r8:80287e08 r7:dfff5e60 r6:848c4380 r5:84bab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0019fb0 to 0xe0019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483bd00 INFO: task kworker/1:156:3510 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:157:3512 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:157 state:D stack:0 pid:3512 tgid:3512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfe39d84 r8:00000002 r7:60000113 r6:dfe39d8c r5:84babc00 r4:84babc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84babc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe39e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84babc00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df877000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437838c r4:84378000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437838c r4:84bf7980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84babc00 r8:84bf79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7980 r8:80287e08 r7:dfff5e60 r6:848c4400 r5:84babc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe39fb0 to 0xdfe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb0c0 INFO: task kworker/1:157:3512 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:3514 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:3514 tgid:3514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfe49d84 r8:00000002 r7:60000113 r6:dfe49d8c r5:84bac800 r4:84bac800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bac800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe49e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb180 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bac800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df96f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437878c r4:84378400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437878c r4:84bf7a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bac800 r8:84bf7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7a00 r8:80287e08 r7:dfff5e60 r6:848c4480 r5:84bac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe49fb0 to 0xdfe49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb200 INFO: task kworker/1:158:3514 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:159:3516 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:159 state:D stack:0 pid:3516 tgid:3516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfe5dd84 r8:00000002 r7:60000013 r6:dfe5dd8c r5:84bad400 r4:84bad400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bad400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe5de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bad400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84378b8c r4:84378800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84378b8c r4:84bf7a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bad400 r8:84bf7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7a80 r8:80287e08 r7:dfff5e60 r6:848c4500 r5:84bad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe5dfb0 to 0xdfe5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb380 INFO: task kworker/1:159:3516 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b71f4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:160:3518 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:160 state:D stack:0 pid:3518 tgid:3518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfe89d84 r8:00000002 r7:60000013 r6:dfe89d8c r5:84bae000 r4:84bae000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bae000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe89e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bae000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84378f8c r4:84378c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84378f8c r4:84bf7b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bae000 r8:84bf7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7b00 r8:80287e08 r7:dfff5e60 r6:848c4580 r5:84bae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe89fb0 to 0xdfe89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb240 INFO: task kworker/1:160:3518 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b7c21000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:3520 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:3520 tgid:3520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfeb9d84 r8:00000002 r7:60000013 r6:dfeb9d8c r5:84baec00 r4:84baec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84baec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfeb9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84baec00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb63000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437938c r4:84379000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437938c r4:84bf7b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84baec00 r8:84bf7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7b80 r8:80287e08 r7:dfff5e60 r6:848c4600 r5:84baec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfeb9fb0 to 0xdfeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb140 INFO: task kworker/1:161:3520 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b7d8f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:162:3522 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:162 state:D stack:0 pid:3522 tgid:3522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0021d84 r8:00000002 r7:60000113 r6:e0021d8c r5:84ad0c00 r4:84ad0c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad0c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0021e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437978c r4:84379400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437978c r4:84bf7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad0c00 r8:84bf7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7c00 r8:80287e08 r7:dfff5e60 r6:848c4680 r5:84ad0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0021fb0 to 0xe0021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb540 INFO: task kworker/1:162:3522 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b7f0d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:163:3524 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:163 state:D stack:0 pid:3524 tgid:3524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:84ad0000 r4:84ad0000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad0000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cb780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad0000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84379b8c r4:84379800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84379b8c r4:84bf7c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad0000 r8:84bf7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7c80 r8:80287e08 r7:dfff5e60 r6:848c4700 r5:84ad0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb680 INFO: task kworker/1:163:3524 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b8200000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:164:3526 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:164 state:D stack:0 pid:3526 tgid:3526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dffddd84 r8:00000002 r7:60000113 r6:dffddd8c r5:84bbe000 r4:84bbe000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbe000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffdde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbe000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437a38c r4:8437a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437a38c r4:84bf7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbe000 r8:84bf7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7d00 r8:80287e08 r7:dfff5e60 r6:84bf7d80 r5:84bbe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdffddfb0 to 0xdffddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cb980 INFO: task kworker/1:164:3526 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b8531000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:165:3530 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:165 state:D stack:0 pid:3530 tgid:3530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e002dd84 r8:00000002 r7:60000013 r6:e002dd8c r5:84bbec00 r4:84bbec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e002de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c2c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437b78c r4:8437b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437b78c r4:84bf7e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbec00 r8:84bf7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7e00 r8:80287e08 r7:dfff5e60 r6:84bf7e80 r5:84bbec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe002dfb0 to 0xe002dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbb40 INFO: task kworker/1:165:3530 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b87b9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:166:3531 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:166 state:D stack:0 pid:3531 tgid:3531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdd9d84 r8:00000002 r7:60000113 r6:dfdd9d8c r5:84bbd400 r4:84bbd400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbd400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdd9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbe00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437ab8c r4:8437a800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437ab8c r4:84bf7f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbd400 r8:84bf7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7f00 r8:80287e08 r7:e002de60 r6:84bf7f80 r5:84bbd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdd9fb0 to 0xdfdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbb40 INFO: task kworker/1:166:3531 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b8a53000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:167:3534 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:167 state:D stack:0 pid:3534 tgid:3534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0039d84 r8:00000002 r7:60000013 r6:e0039d8c r5:84bba400 r4:84bba400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bba400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0039e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bba400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbfd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437af8c r4:8437ac00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437af8c r4:84bf7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bba400 r8:84bf752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7500 r8:80287e08 r7:e002de60 r6:84bf7180 r5:84bba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0039fb0 to 0xe0039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbf00 INFO: task kworker/1:167:3534 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b8cfa000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:168:3536 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:3536 tgid:3536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e003dd84 r8:00000002 r7:60000013 r6:e003dd8c r5:84bb6c00 r4:84bb6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e003de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc19000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437b38c r4:8437b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437b38c r4:84bf7200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb6c00 r8:84bf722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7200 r8:80287e08 r7:e002de60 r6:84bf7280 r5:84bb6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe003dfb0 to 0xe003dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c100 INFO: task kworker/1:168:3536 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b9356000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:169:3538 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:169 state:D stack:0 pid:3538 tgid:3538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0041d84 r8:00000002 r7:60000013 r6:e0041d8c r5:84bbbc00 r4:84bbbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0041e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc57000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8437bf8c r4:8437bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8437bf8c r4:84bf7300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbbc00 r8:84bf732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7300 r8:80287e08 r7:e002de60 r6:84bf7380 r5:84bbbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0041fb0 to 0xe0041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c280 INFO: task kworker/1:169:3538 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b9356000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3540 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0045d84 r8:00000002 r7:60000113 r6:e0045d8c r5:84ad3000 r4:84ad3000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad3000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0045e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84936d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad3000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8439438c r4:84394000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439438c r4:848c4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad3000 r8:848c47ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848c4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c4780 r8:80287e08 r7:dff21e60 r6:848c4800 r5:84ad3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0045fb0 to 0xe0045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c33c0 INFO: task kworker/0:47:3540 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b9bc2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:170:3542 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:3542 tgid:3542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e004dd84 r8:00000002 r7:60000113 r6:e004dd8c r5:84ad4800 r4:84ad4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e004de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc83000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84afff8c r4:84affc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84afff8c r4:84bf7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad4800 r8:84bf742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7400 r8:80287e08 r7:e0041e60 r6:848c4880 r5:84ad4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe004dfb0 to 0xe004dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c500 INFO: task kworker/1:170:3542 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: b9bc2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:171:3543 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:171 state:D stack:0 pid:3543 tgid:3543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0051d84 r8:00000002 r7:60000113 r6:e0051d8c r5:84ad2400 r4:84ad2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0051e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495838c r4:84958000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495838c r4:84bf7480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad2400 r8:84bf74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf7480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf7480 r8:80287e08 r7:e004de60 r6:848c4900 r5:84ad2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0051fb0 to 0xe0051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c700 INFO: task kworker/1:171:3543 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ba417000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:172:3546 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:172 state:D stack:0 pid:3546 tgid:3546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0055d84 r8:00000002 r7:60000113 r6:e0055d8c r5:84ad3c00 r4:84ad3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0055e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433c940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495878c r4:84958400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495878c r4:843b0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad3c00 r8:843b002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0000 r8:80287e08 r7:e004de60 r6:848c4980 r5:84ad3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0055fb0 to 0xe0055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c840 INFO: task kworker/1:172:3546 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ba57f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:173:3548 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:173 state:D stack:0 pid:3548 tgid:3548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0059d84 r8:00000002 r7:60000113 r6:e0059d8c r5:84ad5400 r4:84ad5400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad5400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433ca00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad5400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84958b8c r4:84958800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84958b8c r4:843b0080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad5400 r8:843b00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0080 r8:80287e08 r7:e0055e60 r6:848c4a00 r5:84ad5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0059fb0 to 0xe0059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c900 INFO: task kworker/1:173:3548 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ba911000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:3550 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:3550 tgid:3550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e005dd84 r8:00000002 r7:60000113 r6:e005dd8c r5:84ad6000 r4:84ad6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e005de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cc40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84958f8c r4:84958c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84958f8c r4:843b0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6000 r8:843b012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0100 r8:80287e08 r7:e0059e60 r6:848c4a80 r5:84ad6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe005dfb0 to 0xe005dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c900 INFO: task kworker/1:174:3550 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ba911000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3553 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3553 tgid:3553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0061d84 r8:00000002 r7:60000113 r6:e0061d8c r5:84ad1800 r4:84ad1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0061e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490b740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad1800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd4b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b4f8c r4:844b4c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b4f8c r4:848c4b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad1800 r8:848c4b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848c4b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c4b00 r8:80287e08 r7:e0045e60 r6:848c4b80 r5:84ad1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0061fb0 to 0xe0061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847dc100 INFO: task kworker/0:48:3553 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:175:3554 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:175 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0065d84 r8:00000002 r7:60000013 r6:e0065d8c r5:84bb4800 r4:84bb4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0065e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cd40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495938c r4:84959000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495938c r4:843b0180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb4800 r8:843b01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0180 r8:80287e08 r7:e005de60 r6:848c4c00 r5:84bb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0065fb0 to 0xe0065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433cc00 INFO: task kworker/1:175:3554 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:3556 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:3556 tgid:3556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e006dd84 r8:00000002 r7:60000113 r6:e006dd8c r5:84ad6c00 r4:84ad6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e006de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b871c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495a78c r4:8495a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495a78c r4:843b0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6c00 r8:843b022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0200 r8:80287e08 r7:e0065e60 r6:848c4c80 r5:84ad6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe006dfb0 to 0xe006dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433ccc0 INFO: task kworker/1:176:3556 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: baeb1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:177:3558 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:177 state:D stack:0 pid:3558 tgid:3558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0075d84 r8:00000002 r7:60000013 r6:e0075d8c r5:84a88c00 r4:84a88c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a88c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe65000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495978c r4:84959400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495978c r4:843b0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a88c00 r8:843b02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0280 r8:80287e08 r7:e006de60 r6:848c4d00 r5:84a88c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0075fb0 to 0xe0075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbf40 INFO: task kworker/1:177:3558 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bba4e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:178:3559 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:178 state:D stack:0 pid:3559 tgid:3559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0079d84 r8:00000002 r7:60000113 r6:e0079d8c r5:84a89800 r4:84a89800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a89800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0079e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cbb40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a89800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84959b8c r4:84959800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84959b8c r4:843b0300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a89800 r8:843b032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0300 r8:80287e08 r7:e006de60 r6:848c4d80 r5:84a89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0079fb0 to 0xe0079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848cbf40 INFO: task kworker/1:178:3559 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bba4e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:3561 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:179 state:D stack:0 pid:3561 tgid:3561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0081d84 r8:00000002 r7:60000113 r6:e0081d8c r5:84a88000 r4:84a88000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a88000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433cb80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a88000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe99000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84959f8c r4:84959c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84959f8c r4:843b0380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a88000 r8:843b03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0380 r8:80287e08 r7:e006de60 r6:848c4e00 r5:84a88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0081fb0 to 0xe0081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433c0c0 INFO: task kworker/1:179:3561 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc0f3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:180:3563 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:180 state:D stack:0 pid:3563 tgid:3563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0049d84 r8:00000002 r7:60000113 r6:e0049d8c r5:84970000 r4:84970000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84970000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0049e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84970000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495a38c r4:8495a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495a38c r4:843b0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970000 r8:843b042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0400 r8:80287e08 r7:e006de60 r6:843b0480 r5:84970000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0049fb0 to 0xe0049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87140 INFO: task kworker/1:180:3563 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc0f3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:3566 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:3566 tgid:3566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0085d84 r8:00000002 r7:60000013 r6:e0085d8c r5:84971800 r4:84971800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84971800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84971800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff19000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495bb8c r4:8495b800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495bb8c r4:843b0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84971800 r8:843b052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0500 r8:80287e08 r7:e006de60 r6:843b0580 r5:84971800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0085fb0 to 0xe0085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87180 INFO: task kworker/1:181:3566 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc5c9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:3567 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:3567 tgid:3567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0035d84 r8:00000002 r7:60000113 r6:e0035d8c r5:84972400 r4:84972400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84972400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84972400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495ab8c r4:8495a800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495ab8c r4:843b0600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84972400 r8:843b062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0600 r8:80287e08 r7:e0085e60 r6:843b0680 r5:84972400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87180 INFO: task kworker/1:182:3567 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc797000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:183:3569 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:3569 tgid:3569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e008dd84 r8:00000002 r7:60000113 r6:e008dd8c r5:84973000 r4:84973000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84973000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84973000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495af8c r4:8495ac00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495af8c r4:843b0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84973000 r8:843b072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0700 r8:80287e08 r7:e0085e60 r6:843b0780 r5:84973000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe008dfb0 to 0xe008dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87480 INFO: task kworker/1:183:3569 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bc797000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:3573 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:3573 tgid:3573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0091d84 r8:00000002 r7:60000013 r6:e0091d8c r5:84973c00 r4:84973c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84973c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0091e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84973c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfefb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495b38c r4:8495b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495b38c r4:843b0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84973c00 r8:843b082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0800 r8:80287e08 r7:e0085e60 r6:843b0880 r5:84973c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0091fb0 to 0xe0091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87600 INFO: task kworker/1:184:3573 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bcc8b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:3574 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:3574 tgid:3574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0099d84 r8:00000002 r7:60000013 r6:e0099d8c r5:84974800 r4:84974800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84974800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495b78c r4:8495b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495b78c r4:843b0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84974800 r8:843b092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0900 r8:80287e08 r7:e0085e60 r6:843b0980 r5:84974800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0099fb0 to 0xe0099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87700 INFO: task kworker/1:185:3574 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bccc3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:186:3576 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:186 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a1d84 r8:00000002 r7:60000113 r6:e00a1d8c r5:84975400 r4:84975400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84975400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84975400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff37000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495c38c r4:8495c000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495c38c r4:843b0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84975400 r8:843b0a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0a00 r8:80287e08 r7:e0085e60 r6:843b0a80 r5:84975400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a1fb0 to 0xe00a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87840 INFO: task kworker/1:186:3576 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bccc3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:3578 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:3578 tgid:3578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0095d84 r8:00000002 r7:60000113 r6:e0095d8c r5:84976000 r4:84976000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84976000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0095e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84976000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff25000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495bf8c r4:8495bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495bf8c r4:843b0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84976000 r8:843b0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0b00 r8:80287e08 r7:e00a1e60 r6:843b0b80 r5:84976000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0095fb0 to 0xe0095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87840 INFO: task kworker/1:187:3578 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bd2db000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:3580 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:3580 tgid:3580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a5d84 r8:00000002 r7:60000013 r6:e00a5d8c r5:84976c00 r4:84976c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84976c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b87dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84976c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff43000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495c78c r4:8495c400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495c78c r4:843b0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84976c00 r8:843b0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0c00 r8:80287e08 r7:e00a1e60 r6:843b0c80 r5:84976c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a5fb0 to 0xe00a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87b40 INFO: task kworker/1:188:3580 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bd2db000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:3582 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:3582 tgid:3582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a9d84 r8:00000002 r7:60000013 r6:e00a9d8c r5:84970c00 r4:84970c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84970c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84970c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00af000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495cb8c r4:8495c800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495cb8c r4:843b0d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970c00 r8:843b0d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0d00 r8:80287e08 r7:e00a5e60 r6:843b0d80 r5:84970c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a9fb0 to 0xe00a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b87d40 INFO: task kworker/1:189:3582 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bde2e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:3584 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:3584 tgid:3584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00add84 r8:00000002 r7:60000113 r6:e00add8c r5:84bbc800 r4:84bbc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00db000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495db8c r4:8495d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495db8c r4:843b0e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbc800 r8:843b0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0e00 r8:80287e08 r7:e00a9e60 r6:843b0e80 r5:84bbc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00adfb0 to 0xe00adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438c280 INFO: task kworker/1:190:3584 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bde2e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:3586 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:3586 tgid:3586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00b9d84 r8:00000002 r7:60000013 r6:e00b9d8c r5:84978000 r4:84978000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84978000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84978000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495cf8c r4:8495cc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495cf8c r4:843b0f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84978000 r8:843b0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:843b0f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843b0f00 r8:80287e08 r7:e00ade60 r6:843b0f80 r5:84978000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b9fb0 to 0xe00b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438c100 INFO: task kworker/1:191:3586 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bdf7e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:192:3587 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:192 state:D stack:0 pid:3587 tgid:3587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00cdd84 r8:00000002 r7:60000113 r6:e00cdd8c r5:84979800 r4:84979800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84979800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84979800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495d38c r4:8495d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495d38c r4:84a4c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84979800 r8:84a4c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c000 r8:80287e08 r7:e00ade60 r6:84a4c080 r5:84979800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00cdfb0 to 0xe00cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438c100 INFO: task kworker/1:192:3587 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: be473000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:3589 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:3589 tgid:3589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00d1d84 r8:00000002 r7:60000113 r6:e00d1d8c r5:8497a400 r4:8497a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495d78c r4:8495d400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495d78c r4:84a4c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497a400 r8:84a4c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c100 r8:80287e08 r7:e00ade60 r6:84a4c180 r5:8497a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d1fb0 to 0xe00d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438c100 INFO: task kworker/1:193:3589 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: be473000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:3593 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:3593 tgid:3593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00d9d84 r8:00000002 r7:60000013 r6:e00d9d8c r5:8497bc00 r4:8497bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438c7c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495df8c r4:8495dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495df8c r4:84a4c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497bc00 r8:84a4c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c200 r8:80287e08 r7:e00ade60 r6:84a4c280 r5:8497bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d9fb0 to 0xe00d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438c100 INFO: task kworker/1:194:3593 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: be7e1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:3594 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:3594 tgid:3594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00e5d84 r8:00000002 r7:60000113 r6:e00e5d8c r5:8497c800 r4:8497c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8438cb00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495e38c r4:8495e000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495e38c r4:84a4c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497c800 r8:84a4c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c300 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bf134000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f5e08 r9:83018205 r8:8497b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 r5:8495e78c r4:8495e400 r10:61c88647 r9:8497b000 r8:84a4c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xdff71d28 to 0xdff71d70) r5:00001000 r4:dfb07000 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:3598 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:3598 tgid:3598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r5:8495eb8c r4:8495e800 r10:61c88647 r9:8497ec00 r8:84a4c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84839400 r4:84978c00 r4:00000000 r9:83018205 r8:84978c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0105000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b5f8c r4:844b5c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844b5f8c r4:84a4c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84978c00 r8:84a4c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c600 r8:80287e08 r7:e00fde60 r6:84a4c680 r5:84978c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0109fb0 to 0xe0109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438cf40 INFO: task kworker/1:198:3600 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bf337000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 r4:84839400 task:kworker/1:199 state:D stack:0 pid:3602 tgid:3602 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84860000 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495ef8c r4:8495ec00 r10:61c88647 r9:84860000 r8:84a4c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438cfc0 INFO: task kworker/1:199:3602 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bf337000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:3604 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:3604 tgid:3604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfdddd84 r8:00000002 r7:60000113 r6:dfdddd8c r5:84862400 r4:84862400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfddde08 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84862400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495f38c r4:8495f000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495f38c r4:84a4c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84862400 r8:84a4c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c800 r8:80287e08 r7:e0111e60 r6:84a4c880 r5:84862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843410c0 INFO: task kworker/1:200:3604 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bf737000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfb07000 r5:8455378c r4:84553400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84860c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843418c0 r5:84acc38c r4:84acc000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe011dfb0 to 0xe011dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84341300 INFO: task kworker/1:201:3607 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bf737000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:202:3609 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:3609 tgid:3609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00c1d84 r8:00000002 r7:60000013 r6:e00c1d8c r5:84863000 r4:84863000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84863000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:8495f78c r4:8495f400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a4ca00 Exception stack(0xe00c1fb0 to 0xe00c1ff8) INFO: task kworker/1:202:3609 is blocked on a mutex likely owned by task kworker/1:133:3463. Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: bfc82000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:3611 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:3611 tgid:3611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dff65d84 r8:00000002 r7:60000013 r6:dff65d8c r5:84863c00 r4:84863c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84863c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff65e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843415c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84863c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495fb8c r4:8495f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8495fb8c r4:84a4cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84863c00 r8:84a4cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4cb00 r8:80287e08 r7:e011de60 r6:84a4cb80 r5:84863c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff65fb0 to 0xdff65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84341500 INFO: task kworker/1:203:3611 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c01a4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 Workqueue: events bpf_prog_free_deferred r4:84864800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0125e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843416c0 r5:8495ff8c r4:8495fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84864800 r8:84a4cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4cc00 r8:80287e08 r7:e011de60 r6:84a4cc80 r5:84864800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0125fb0 to 0xe0125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843413c0 INFO: task kworker/1:204:3613 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c01a4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:3614 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:3614 tgid:3614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0129d84 r8:00000002 r7:60000013 r6:e0129d8c r5:84866000 r4:84866000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84866000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0129e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84341e80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84866000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84accf8c r4:84accc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84accf8c r4:84a4cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84866000 r8:84a4cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4cd00 r8:80287e08 r7:e011de60 r6:84a4cd80 r5:84866000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0129fb0 to 0xe0129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843413c0 INFO: task kworker/1:205:3614 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c077a000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:3616 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:3616 tgid:3616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e012dd84 r8:00000002 r7:60000013 r6:e012dd8c r5:84866c00 r4:84866c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84866c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e012de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84341c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84866c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acc78c r4:84acc400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84acc78c r4:84a4ce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84866c00 r8:84a4ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4ce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4ce00 r8:80287e08 r7:e0129e60 r6:84a4ce80 r5:84866c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe012dfb0 to 0xe012dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843413c0 INFO: task kworker/1:206:3616 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c077a000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:3619 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:3619 tgid:3619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0121d84 r8:00000002 r7:60000013 r6:e0121d8c r5:84865400 r4:84865400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84865400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0121e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84341d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84865400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa87000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84accb8c r4:84acc800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84accb8c r4:84a4cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84865400 r8:84a4cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4cf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4cf00 r8:80287e08 r7:e0129e60 r6:84a4cf80 r5:84865400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0121fb0 to 0xe0121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84341d00 INFO: task kworker/1:207:3619 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c0bcc000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:3621 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:3621 tgid:3621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0135d84 r8:00000002 r7:60000013 r6:e0135d8c r5:84861800 r4:84861800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84861800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0135e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83902180 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84861800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acd38c r4:84acd000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84acd38c r4:84909000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84861800 r8:8490902c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909000 r8:80287e08 r7:e0129e60 r6:84909080 r5:84861800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0135fb0 to 0xe0135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83902500 INFO: task kworker/1:208:3621 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c0bcc000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:3623 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:3623 tgid:3623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0139d84 r8:00000002 r7:60000113 r6:e0139d8c r5:8497e000 r4:8497e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0139e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490e040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acd78c r4:84acd400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84acd78c r4:84909180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497e000 r8:849091ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909180 r8:80287e08 r7:e0135e60 r6:84909200 r5:8497e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0139fb0 to 0xe0139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490e0c0 INFO: task kworker/1:209:3623 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c122d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:3625 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:3625 tgid:3625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e013dd84 r8:00000002 r7:60000113 r6:e013dd8c r5:8497d400 r4:8497d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e013de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490e2c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497d400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb15000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acdb8c r4:84acd800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84acdb8c r4:84909280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497d400 r8:849092ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909280 r8:80287e08 r7:e0139e60 r6:84909300 r5:8497d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe013dfb0 to 0xe013dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490e0c0 INFO: task kworker/1:210:3625 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c122d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:3628 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0141d84 r8:00000002 r7:60000113 r6:e0141d8c r5:84868000 r4:84868000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84868000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0141e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490e580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84868000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ace38c r4:84ace000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ace38c r4:84909380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84868000 r8:849093ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909380 r8:80287e08 r7:e013de60 r6:84909400 r5:84868000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0141fb0 to 0xe0141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490e280 INFO: task kworker/1:211:3628 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c122d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:3629 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:3629 tgid:3629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0149d84 r8:00000002 r7:60000113 r6:e0149d8c r5:84868c00 r4:84868c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84868c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0149e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490e380 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84868c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb35000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acdf8c r4:84acdc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84acdf8c r4:84909480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84868c00 r8:849094ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909480 r8:80287e08 r7:e0141e60 r6:84909500 r5:84868c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0149fb0 to 0xe0149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490e3c0 INFO: task kworker/1:212:3629 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c16a1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:3631 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:3631 tgid:3631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0131d84 r8:00000002 r7:60000113 r6:e0131d8c r5:84869800 r4:84869800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84869800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0131e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490e740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84869800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd13000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ace78c r4:84ace400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ace78c r4:84909580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84869800 r8:849095ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909580 r8:80287e08 r7:e0141e60 r6:84909600 r5:84869800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0131fb0 to 0xe0131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490e3c0 INFO: task kworker/1:213:3631 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c16a1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:3633 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:214 state:D stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e014dd84 r8:00000002 r7:60000113 r6:e014dd8c r5:8486a400 r4:8486a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8486a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e014de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490ee40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8486a400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd7b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acf78c r4:84acf400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84acf78c r4:84909680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8486a400 r8:849096ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909680 r8:80287e08 r7:e0131e60 r6:84909700 r5:8486a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe014dfb0 to 0xe014dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490e700 INFO: task kworker/1:214:3633 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c1be1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:3635 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:3635 tgid:3635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0155d84 r8:00000002 r7:60000013 r6:e0155d8c r5:8486bc00 r4:8486bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8486bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0155e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490e800 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8486bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd29000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aceb8c r4:84ace800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aceb8c r4:84909780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8486bc00 r8:849097ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909780 r8:80287e08 r7:e014de60 r6:84909800 r5:8486bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0155fb0 to 0xe0155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490e840 INFO: task kworker/1:215:3635 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c1be1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:3636 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:3636 tgid:3636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0159d84 r8:00000002 r7:60000113 r6:e0159d8c r5:84a8e000 r4:84a8e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84acef8c r4:84acec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe0159fb0 to 0xe0159ff8) INFO: task kworker/1:216:3636 is blocked on a mutex likely owned by task kworker/1:133:3463. Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r4:dff71dc0 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3639 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3639 tgid:3639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0151d84 r8:00000002 r7:60000113 r6:e0151d8c r5:84a8bc00 r4:84a8bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0151e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490b480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffbf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b578c r4:844b5400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b578c r4:848c4f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8bc00 r8:848c4f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848c4f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c4f00 r8:80287e08 r7:e0045e60 r6:848c4f80 r5:84a8bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0151fb0 to 0xe0151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490b700 INFO: task kworker/0:49:3639 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c2157000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:217:3640 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:3640 tgid:3640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0161d84 r8:00000002 r7:60000013 r6:e0161d8c r5:84a8d400 r4:84a8d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0161e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490edc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd67000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acf38c r4:84acf000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84acf38c r4:84909900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8d400 r8:8490992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909900 r8:80287e08 r7:e014de60 r6:8491d000 r5:84a8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0161fb0 to 0xe0161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490e980 INFO: task kworker/1:217:3640 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:3643 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:3643 tgid:3643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e016dd84 r8:00000002 r7:60000113 r6:e016dd8c r5:84a8a400 r4:84a8a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e016de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490ef40 r5:84acfb8c r4:84acf800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84909980 r8:80287e08 r7:e014de60 r6:8491d080 r5:84a8a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:3645 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:3645 tgid:3645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e015dd84 r8:00000002 r7:60000113 r6:e015dd8c r5:8486c800 r4:8486c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8486c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e015de08 r9:83018205 r8:8486c800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:8488438c r4:84884000 r7:ddde2d80 r6:83018200 r5:8488438c r4:84909a00 r10:00000000 r9:84909a00 r8:80287e08 r7:e016de60 r6:84909a80 r5:8486c800 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: c2899000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:dff71dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:3647 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:3647 tgid:3647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8486d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0165e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc700 r5:84acff8c r4:84acfc00 r7:ddde2d80 r6:83018200 r5:84acff8c r4:84909b00 r10:00000000 r9:84909b00 r8:80287e08 r7:e015de60 r6:84909b80 r5:8486d400 INFO: task kworker/1:220:3647 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c2899000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:3649 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:3649 tgid:3649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0171d84 r8:00000002 r7:60000013 r6:e0171d8c r5:8486e000 r4:8486e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8486e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0171e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491e1c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8486e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488478c r4:84884400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488478c r4:84909c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8486e000 r8:84909c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909c00 r8:80287e08 r7:e015de60 r6:84909c80 r5:8486e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0171fb0 to 0xe0171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdff71d28 to 0xdff71d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r4:dff71dc0 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:3651 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:3651 tgid:3651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0179d84 r8:00000002 r7:60000113 r6:e0179d8c r5:8486ec00 r4:8486ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8486ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0179e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491e340 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8486ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84884b8c r4:84884800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84884b8c r4:84909d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8486ec00 r8:84909d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909d00 r8:80287e08 r7:e0171e60 r6:84909d80 r5:8486ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0179fb0 to 0xe0179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491e180 INFO: task kworker/1:222:3651 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c2d2a000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:3653 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:8486b000 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:dff6b000 r5:8488538c r4:84885000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488538c r4:84909e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8486b000 r8:84909e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909e00 r8:80287e08 r7:e0179e60 r6:84909e80 r5:8486b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe017dfb0 to 0xe017dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491e180 INFO: task kworker/1:223:3653 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c31a3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:3655 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:224 state:D stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:848d0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0189e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491e4c0 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84909f00 r8:80287e08 r7:e017de60 r6:84909f80 r5:848d0000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:224:3655 is blocked on a mutex likely owned by task kworker/1:133:3463. r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 1d20: c375b000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:82ac21e4 r4:dff71dc0 r4:00000000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:3658 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:225 state:D stack:0 pid:3658 tgid:3658 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e018dd84 r8:00000002 r7:60000113 r6:e018dd8c r5:848d0c00 r4:848d0c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d0c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e018de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491e700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff79000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488578c r4:84885400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488578c r4:84909100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d0c00 r8:8490912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84909100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84909100 r8:80287e08 r7:e017de60 r6:84929000 r5:848d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe018dfb0 to 0xe018dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491e580 INFO: task kworker/1:225:3658 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c375b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:3659 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0191d84 r8:00000002 r7:60000013 r6:e0191d8c r5:848d1800 r4:848d1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0191e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491e940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff87000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84885b8c r4:84885800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84885b8c r4:84929080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d1800 r8:849290ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929080 r8:80287e08 r7:e018de60 r6:84929100 r5:848d1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0191fb0 to 0xe0191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491e740 INFO: task kworker/1:226:3659 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c3e4a000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:227:3661 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:227 state:D stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0195d84 r8:00000002 r7:60000013 r6:e0195d8c r5:848d2400 r4:848d2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0195e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491eb40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488638c r4:84886000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488638c r4:84929180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d2400 r8:849291ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929180 r8:80287e08 r7:e0191e60 r6:84929200 r5:848d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0195fb0 to 0xe0195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491e900 INFO: task kworker/1:227:3661 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c3e4a000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:3663 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:3663 tgid:3663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0199d84 r8:00000002 r7:60000113 r6:e0199d8c r5:848d3000 r4:848d3000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d3000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0199e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491ea00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff91000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84885f8c r4:84885c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84885f8c r4:84929280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d3000 r8:849292ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491ec40 INFO: task kworker/1:228:3663 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c4237000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:229:3665 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:229 state:D stack:0 pid:3665 tgid:3665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0175d84 r8:00000002 r7:60000113 r6:e0175d8c r5:848d4800 r4:848d4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0175e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84930600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488738c r4:84887000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488738c r4:84929380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d4800 r8:849293ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929380 r8:80287e08 r7:e0195e60 r6:84929400 r5:848d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0175fb0 to 0xe0175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491eb80 INFO: task kworker/1:229:3665 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c4237000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:230:3666 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:230 state:D stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e019dd84 r8:00000002 r7:60000013 r6:e019dd8c r5:848d5400 r4:848d5400 r5:848d5400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e019de08 r9:83018205 r8:848d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:8488678c r4:84886400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848d5400 r8:849294ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 r4:00000000 r5:00001000 r4:dfb07000 r5:8455378c r4:84553400 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:3668 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:3668 tgid:3668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e01a5d84 r8:00000002 r7:60000013 r6:e01a5d8c r5:848d3c00 r4:848d3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01a5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84930240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84886b8c r4:84886800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84886b8c r4:84929580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d3c00 r8:849295ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929580 r8:80287e08 r7:e0175e60 r6:84929600 r5:848d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01a5fb0 to 0xe01a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491ec40 INFO: task kworker/1:231:3668 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c4a9e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3671 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3671 tgid:3671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e01b1d84 r8:00000002 r7:60000113 r6:e01b1d8c r5:85000000 r4:85000000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85000000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01b1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84939480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85000000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488df8c r4:8488dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8488df8c r4:8491d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85000000 r8:8491d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491d100 r8:80287e08 r7:e0045e60 r6:84929680 r5:85000000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b1fb0 to 0xe01b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490b300 INFO: task kworker/0:50:3671 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c4d13000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8455378c r4:84553400 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:85000c00 r5:85000c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01b5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84930500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85000c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84886f8c r4:84886c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84886f8c r4:84929700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85000c00 r8:8492972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929700 r8:80287e08 r7:e0175e60 r6:84929780 r5:85000c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b5fb0 to 0xe01b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84930100 INFO: task kworker/1:232:3672 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c4d13000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:233:3675 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:233 state:D stack:0 pid:3675 tgid:3675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85003000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01b9e08 r9:83018205 r8:85003000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 r5:84887b8c r4:84887800 r10:61c88647 r9:85003000 r8:8492982c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: c50ed000 dfae3000 00000001 80239b98 7f14f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:234 state:D stack:0 pid:3676 tgid:3676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e01a1d84 r8:00000002 r7:60000013 r6:e01a1d8c r5:84a8ec00 r4:84a8ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01a1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84930800 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0003000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488778c r4:84887400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488778c r4:84929900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a8ec00 r8:8492992c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929900 r8:80287e08 r7:e01b9e60 r6:8491d180 r5:84a8ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01a1fb0 to 0xe01a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84930740 INFO: task kworker/1:234:3676 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c548f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:3679 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:3679 tgid:3679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04c1d84 r8:00000002 r7:60000113 r6:e04c1d8c r5:84a8b000 r4:84a8b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a8b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84887f8c r4:84887c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a8b000 r8:849299ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84929980 r8:80287e08 r7:e01b9e60 r6:8491d200 r5:84a8b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84930880 INFO: task kworker/1:235:3679 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c5718000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:236:3681 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:236 state:D stack:0 pid:3681 tgid:3681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04c9d84 r8:00000002 r7:60000113 r6:e04c9d8c r5:84b46000 r4:84b46000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b46000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84930b80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b46000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cb000 r5:8488c38c r4:8488c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c59fe000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:3683 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04d9d84 r8:00000002 r7:60000113 r6:e04d9d8c r5:84590c00 r4:84590c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84590c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84930e40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84590c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488cb8c r4:8488c800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488cb8c r4:84929a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84590c00 r8:84929aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929a80 r8:80287e08 r7:e04c9e60 r6:8491d300 r5:84590c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:3685 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:3685 tgid:3685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04e5d84 r8:00000002 r7:60000113 r6:e04e5d8c r5:84592400 r4:84592400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84592400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84930c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84592400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488c78c r4:8488c400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488c78c r4:84929b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84592400 r8:84929b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929b00 r8:80287e08 r7:e04d9e60 r6:8491d380 r5:84592400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84930e00 INFO: task kworker/1:238:3685 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c5e56000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:239 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84591800 r4:8291a680 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488cf8c r4:8488cc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488cf8c r4:84929b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84591800 r8:84929bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929b80 r8:80287e08 r7:e04d9e60 r6:8491d400 r5:84591800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f9fb0 to 0xe04f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84930d80 INFO: task kworker/1:239:3687 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c5f17000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:3688 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:3688 tgid:3688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04fdd84 r8:00000002 r7:60000013 r6:e04fdd8c r5:84590000 r4:84590000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84590000 r4:8291a680 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfc0f000 r5:8488e38c r4:8488e000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84590000 r8:84929c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84930d80 Call trace: 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:3690 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:241 state:D stack:0 pid:3690 tgid:3690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0501d84 r8:00000002 r7:60000113 r6:e0501d8c r5:84593000 r4:84593000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84593000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0501e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84939040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84593000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488d38c r4:8488d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488d38c r4:84929c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84593000 r8:84929cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929c80 r8:80287e08 r7:e04fde60 r6:8491d500 r5:84593000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0501fb0 to 0xe0501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491ef00 INFO: task kworker/1:241:3690 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c6667000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:3692 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:3692 tgid:3692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84593c00 r5:84593c00 r4:8291a680 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0509e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84939180 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84593c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488d78c r4:8488d400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488d78c r4:84929d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84593c00 r8:84929d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929d00 r8:80287e08 r7:e04fde60 r6:8491d580 r5:84593c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0509fb0 to 0xe0509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84939080 INFO: task kworker/1:242:3692 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c6667000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:243 state:D stack:0 pid:3694 tgid:3694 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0511e08 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8488db8c r4:8488d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84594800 r8:84929dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84939140 INFO: task kworker/1:243:3694 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c6a85000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:3696 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0519d84 r8:00000002 r7:60000113 r6:e0519d8c r5:84595400 r4:84595400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84595400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0519e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84939800 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84595400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc33000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488e78c r4:8488e400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488e78c r4:84929e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84595400 r8:84929e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929e00 r8:80287e08 r7:e04fde60 r6:8491d680 r5:84595400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0519fb0 to 0xe0519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84939280 INFO: task kworker/1:244:3696 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c6ad5000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3699 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3699 tgid:3699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0515d84 r8:00000002 r7:60000113 r6:e0515d8c r5:84596c00 r4:84596c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84596c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0515e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84596c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0573000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84395b8c r4:84395800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84395b8c r4:8491d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84596c00 r8:8491d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491d700 r8:80287e08 r7:e0045e60 r6:8491d780 r5:84596c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0515fb0 to 0xe0515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84936dc0 INFO: task kworker/0:51:3699 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r5:00001000 r4:dfb07000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84596000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01ade08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8439478c r4:8491d800 r10:61c88647 r9:84596000 r8:8491d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491d800 r8:80287e08 r7:e0515e60 r6:8491d880 r5:84596000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01adfb0 to 0xe01adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84936dc0 INFO: task kworker/0:52:3700 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c7035000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:3705 blocked for more than 453 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08 r9:83018205 r8:85001800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 r5:8488eb8c r4:8488e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85004800 r8:84929fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84929f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84929f80 r8:80287e08 r7:e0521e60 r6:84938000 r5:85004800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84939940 INFO: task kworker/1:246:3708 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c7124000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:3709 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:3709 tgid:3709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e051dd84 r8:00000002 r7:60000113 r6:e051dd8c r5:85005400 r4:85005400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85005400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84939b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85005400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc71000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488ef8c r4:8488ec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488ef8c r4:84938080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85005400 r8:849380ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938080 r8:80287e08 r7:e0529e60 r6:84938100 r5:85005400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84939940 INFO: task kworker/1:247:3709 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c754d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:3711 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:3711 tgid:3711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:85006000 r4:85006000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85006000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84939cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85006000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc91000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488f38c r4:8488f000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488f38c r4:84938180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85006000 r8:849381ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938180 r8:80287e08 r7:e0529e60 r6:84938200 r5:85006000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe052dfb0 to 0xe052dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84939e00 INFO: task kworker/1:248:3711 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c76ec000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:3714 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85006c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84939f00 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8488fb8c r4:8488f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8488fb8c r4:84938280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85006c00 r8:849382ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938280 r8:80287e08 r7:e0529e60 r6:84938300 r5:85006c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0531fb0 to 0xe0531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84939d80 INFO: task kworker/1:249:3714 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c76ec000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:3715 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0535d84 r8:00000002 r7:60000113 r6:e0535d8c r5:85003c00 r4:85003c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85003c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfe3b000 r5:8488ff8c r4:8488fc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85003c00 r8:849383ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:250:3715 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c7b09000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3717 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3717 tgid:3717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:848d6000 r4:848d6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84936900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84394b8c r4:84394800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84394b8c r4:8491d900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d6000 r8:8491d92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491d900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491d900 r8:80287e08 r7:e0515e60 r6:84938500 r5:848d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe053dfb0 to 0xe053dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849368c0 INFO: task kworker/0:53:3717 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c7bb4000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:3718 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:3718 tgid:3718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0541d84 r8:00000002 r7:60000013 r6:e0541d8c r5:848d6c00 r4:848d6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848d6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0541e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe57000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8489838c r4:84898000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8489838c r4:84938480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d6c00 r8:849384ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938480 r8:80287e08 r7:e0535e60 r6:84938580 r5:848d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0541fb0 to 0xe0541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814240 INFO: task kworker/1:251:3718 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c7f5b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:3720 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:3720 tgid:3720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0545d84 r8:00000002 r7:60000113 r6:e0545d8c r5:84bf8000 r4:84bf8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0545e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bf8000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84898b8c r4:84898800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84898b8c r4:84938600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf8000 r8:8493862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938600 r8:80287e08 r7:e0541e60 r6:84938680 r5:84bf8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0545fb0 to 0xe0545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814100 INFO: task kworker/1:252:3720 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c8117000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:3721 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:3721 tgid:3721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0549d84 r8:00000002 r7:60000013 r6:e0549d8c r5:84bf8c00 r4:84bf8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bf8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe79000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8489878c r4:84898400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8489878c r4:84938700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf8c00 r8:8493872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938700 r8:80287e08 r7:e0545e60 r6:84938780 r5:84bf8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814100 INFO: task kworker/1:253:3721 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c8316000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3724 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0555d84 r8:00000002 r7:60000113 r6:e0555d8c r5:84bfb000 r4:84bfb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0555e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84941040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bfb000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe95000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84394f8c r4:84394c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84394f8c r4:8491d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfb000 r8:8491d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491d980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491d980 r8:80287e08 r7:e0515e60 r6:84938800 r5:84bfb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0555fb0 to 0xe0555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84936980 INFO: task kworker/0:54:3724 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c888c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3726 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3726 tgid:3726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0559d84 r8:00000002 r7:60000113 r6:e0559d8c r5:84bf9800 r4:84bf9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bf9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0559e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84941d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bf9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0069000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8439538c r4:84395000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439538c r4:8491da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bf9800 r8:8491da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491da00 r8:80287e08 r7:e0515e60 r6:84938880 r5:84bf9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0559fb0 to 0xe0559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84941100 INFO: task kworker/0:55:3726 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c888c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:3728 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:3728 tgid:3728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e055dd84 r8:00000002 r7:60000113 r6:e055dd8c r5:84a7a400 r4:84a7a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e055de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814b40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8489938c r4:84899000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8489938c r4:84938900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7a400 r8:8493892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938900 r8:80287e08 r7:e0545e60 r6:8491da80 r5:84a7a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814900 INFO: task kworker/1:254:3728 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c8b9c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:3729 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:3729 tgid:3729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0561d84 r8:00000002 r7:60000113 r6:e0561d8c r5:84a78000 r4:84a78000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a78000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a78000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84898f8c r4:84898c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84898f8c r4:84938980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a78000 r8:849389ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938980 r8:80287e08 r7:e055de60 r6:8491db00 r5:84a78000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0561fb0 to 0xe0561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814bc0 INFO: task kworker/1:255:3729 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c8fde000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:3733 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:3733 tgid:3733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0571d84 r8:00000002 r7:60000113 r6:e0571d8c r5:84a7b000 r4:84a7b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0571e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfefd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8489978c r4:84899400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8489978c r4:84938a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7b000 r8:84938a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938a00 r8:80287e08 r7:e055de60 r6:8491db80 r5:84a7b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0571fb0 to 0xe0571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814ac0 INFO: task kworker/1:256:3733 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c90ed000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:3734 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:3734 tgid:3734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e057dd84 r8:00000002 r7:60000113 r6:e057dd8c r5:84a7c800 r4:84a7c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff11000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84899b8c r4:84899800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84899b8c r4:84938a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7c800 r8:84938aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938a80 r8:80287e08 r7:e0571e60 r6:8491dc00 r5:84a7c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe057dfb0 to 0xe057dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814ac0 INFO: task kworker/1:257:3734 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c932a000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:3737 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:3737 tgid:3737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0589d84 r8:00000002 r7:60000113 r6:e0589d8c r5:84a7e000 r4:84a7e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814f00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff2d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84899f8c r4:84899c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84899f8c r4:84938b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7e000 r8:84938b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938b00 r8:80287e08 r7:e057de60 r6:8491dc80 r5:84a7e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0589fb0 to 0xe0589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814e00 INFO: task kworker/1:258:3737 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c966f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:3738 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:3738 tgid:3738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e058dd84 r8:00000002 r7:60000113 r6:e058dd8c r5:84a7bc00 r4:84a7bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490b5c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff41000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8489a38c r4:8489a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8489a38c r4:84938b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7bc00 r8:84938bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938b80 r8:80287e08 r7:e0589e60 r6:8491dd00 r5:84a7bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84814f40 INFO: task kworker/1:259:3738 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c97dc000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:3741 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0599d84 r8:00000002 r7:60000113 r6:e0599d8c r5:84a78c00 r4:84a78c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a78c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0599e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3b000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0013000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8489a78c r4:8489a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8489a78c r4:84938c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a78c00 r8:84938c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938c00 r8:80287e08 r7:e058de60 r6:8491dd80 r5:84a78c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0599fb0 to 0xe0599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3b0c0 INFO: task kworker/1:260:3741 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c9a79000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:3743 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:3743 tgid:3743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05a1d84 r8:00000002 r7:60000113 r6:e05a1d8c r5:84a7ec00 r4:84a7ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3b1c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8489ab8c r4:8489a800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8489ab8c r4:84938c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7ec00 r8:84938cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938c80 r8:80287e08 r7:e0599e60 r6:8491de00 r5:84a7ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a1fb0 to 0xe05a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3b0c0 INFO: task kworker/1:261:3743 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: c9def000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:84839400 Workqueue: events bpf_prog_free_deferred r5:84a8c800 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e002f000 r5:8489af8c r4:8489ac00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84938d00 r8:80287e08 r7:e05a1e60 r6:8491de80 r5:84a8c800 r4:84b3b180 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff71d28 to 0xdff71d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r5:00001000 r4:dfb07000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8489bb8c r4:84938d80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:3749 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:3749 tgid:3749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0551d84 r8:00000002 r7:60000113 r6:e0551d8c r5:84bfc800 r4:84bfc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0551e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3b500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8489b38c r4:8489b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8489b38c r4:84938e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfc800 r8:84938eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84938e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84938e80 r8:80287e08 r7:e0539e60 r6:84938f00 r5:84bfc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3b280 INFO: task kworker/1:264:3749 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ca28c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:56 state:D stack:0 pid:3751 tgid:3751 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e059de08 r9:83018005 r8:84bfe000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0117000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8439578c r4:84395400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439578c r4:8491df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfe000 r8:8491df2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491df00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491df00 r8:80287e08 r7:e0515e60 r6:84938f80 r5:84bfe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe059dfb0 to 0xe059dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84941f40 INFO: task kworker/0:56:3751 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ca550000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:3752 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bfec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r7:ddde2d80 r6:83018200 r5:8489b78c r4:84af0000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r5:8455378c r4:84553400 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84bfd400 r8:84af012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:267:3756 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:267 state:D stack:0 pid:3756 tgid:3756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05b5d84 r8:00000002 r7:60000113 r6:e05b5d8c r5:84bfa400 r4:84bfa400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bfa400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3bbc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848a038c r4:848a0000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a038c r4:84af0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bfa400 r8:84af022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0200 r8:80287e08 r7:e05ade60 r6:84af0280 r5:84bfa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b5fb0 to 0xe05b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3b840 INFO: task kworker/1:267:3756 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cad1f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r5:00001000 r4:dfb07000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:268 state:D stack:0 pid:3758 tgid:3758 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b1e08 r9:83018205 r8:85002400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 r5:848a078c r4:848a0400 r10:61c88647 r9:85002400 r8:84af032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3be80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ed000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848a0b8c r4:848a0800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a0b8c r4:84af0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be8000 r8:84af042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0400 r8:80287e08 r7:e05b1e60 r6:84af0480 r5:84be8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b9fb0 to 0xe05b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3bcc0 INFO: task kworker/1:269:3760 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cb0ad000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84be8c00 r8:84af052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:82ac21e4 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ab9800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08 r5:00001000 r4:e05d7000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84af0600 r8:80287e08 r7:e05bde60 r6:8491df80 r5:84ab9800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c9fb0 to 0xe05c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84555140 INFO: task kworker/1:271:3764 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cb600000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:272:3766 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:272 state:D stack:0 pid:3766 tgid:3766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05cdd84 r8:00000002 r7:60000013 r6:e05cdd8c r5:84ab8c00 r4:84ab8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05cde08 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e010b000 r5:848a138c r4:848a1000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:272:3766 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cb600000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:273:3768 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:273 state:D stack:0 pid:3768 tgid:3768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05c1d84 r8:00000002 r7:60000113 r6:e05c1d8c r5:84bea400 r4:84bea400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bea400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845554c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bea400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05dd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848a1b8c r4:848a1800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a1b8c r4:84af0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bea400 r8:84af072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0700 r8:80287e08 r7:e05c9e60 r6:84af0780 r5:84bea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84555140 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) r4:dff71dc0 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05d5d84 r8:00000002 r7:60000113 r6:e05d5d8c r5:84be9800 r4:84be9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84be9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85035900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84be9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdef000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84396f8c r4:84396c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84396f8c r4:84883080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84be9800 r8:848830ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84883080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84953080 INFO: task kworker/0:57:3770 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cbc51000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84953300 r5:8439638c r4:84396000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84abb000 r8:8488312c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff71fb0 to 0xdff71ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:dff71dc0 r5:00001000 r4:dfb07000 r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) INFO: task kworker/1:275:3776 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0611d84 r8:00000002 r7:60000013 r6:e0611d8c r5:84abe000 r4:84abe000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84abe000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0611e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84555b80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848a2f8c r4:848a2c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a2f8c r4:84af0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84abe000 r8:84af092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0900 r8:80287e08 r7:e0601e60 r6:84883280 r5:84abe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0611fb0 to 0xe0611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84555600 INFO: task kworker/1:275:3776 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cc50e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff71fb0 to 0xdff71ff8) INFO: task kworker/1:276:3777 blocked for more than 454 seconds. r5:84abc800 r4:8291a680 r4:00000000 r4:00000000 r5:00001000 r4:e0609000 r5:848a238c r4:848a2000 r10:61c88647 r9:84abc800 r8:84af09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfb07000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:3779 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:3779 tgid:3779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0629d84 r8:00000002 r7:60000013 r6:e0629d8c r5:84abd400 r4:84abd400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84abd400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84555940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84abd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848a278c r4:848a2400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a278c r4:84af0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84abd400 r8:84af0a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0a00 r8:80287e08 r7:e0611e60 r6:84883380 r5:84abd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0629fb0 to 0xe0629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84555700 INFO: task kworker/1:277:3779 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 Exception stack(0xdff71d28 to 0xdff71d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84555a80 r5:848a2b8c r4:848a2800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff71d28 to 0xdff71d70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84555c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a79800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0659000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848a338c r4:848a3000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a338c r4:84af0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a79800 r8:84af0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0b00 r8:80287e08 r7:e0611e60 r6:84883480 r5:84a79800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:845559c0 INFO: task kworker/1:279:3783 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cccf8000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:3786 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84ab8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 r7:ddde2d80 r6:83018200 r5:848a378c r4:84af0b80 r10:00000000 r9:84af0b80 r8:80287e08 r7:e064de60 r6:84883500 r5:84ab8000 INFO: task kworker/1:280:3786 is blocked on a mutex likely owned by task kworker/1:133:3463. 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:8483a980 1fa0: 00000000 00000000 00000000 00000000 r4:84aba400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08 r5:848a3b8c r4:848a3800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a3b8c r4:84af0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aba400 r8:84af0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0c00 r8:80287e08 r7:e0675e60 r6:84883580 r5:84aba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0685fb0 to 0xe0685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84555f80 INFO: task kworker/1:281:3787 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cd361000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:3790 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04d5d84 r8:00000002 r7:60000013 r6:e04d5d8c r5:84b58c00 r4:84b58c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b58c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84941740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:848a3f8c r4:848a3c00 r10:61c88647 r9:84b58c00 r8:84af0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:282:3790 is blocked on a mutex likely owned by task kworker/1:133:3463. [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:8455378c r4:84553400 Exception stack(0xdff71fb0 to 0xdff71ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:dfa41000 r7:ddde2d80 r6:83018200 r5:848a878c r4:84af0d00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: cd7a1000 dfae3000 00000001 80239b98 7f14f000 00000001 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:3794 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0691d84 r8:00000002 r7:60000113 r6:e0691d8c r5:84b5b000 r4:84b5b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b5b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850330c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848a838c r4:848a8000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a838c r4:84af0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b5b000 r8:84af0dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0d80 r8:80287e08 r7:e04dde60 r6:84883700 r5:84b5b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0691fb0 to 0xe0691ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:84b5bc00 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b5bc00 r8:84af0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85033080 INFO: task kworker/1:285:3795 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cdc18000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:3797 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06a9d84 r8:00000002 r7:60000113 r6:e06a9d8c r5:84b5a400 r4:84b5a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b5a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb01000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8439678c r4:84396400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8439678c r4:84af0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b5a400 r8:84af0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af0e80 r8:80287e08 r7:e069de60 r6:84883800 r5:84b5a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3801 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3801 tgid:3801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05d1d84 r8:00000002 r7:60000113 r6:e05d1d8c r5:84b5d400 r4:84b5d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b5d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850356c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b5d400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84396b8c r4:84396800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84396b8c r4:84883880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b5d400 r8:848838ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84883880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84883880 r8:80287e08 r7:e05d5e60 r6:84883900 r5:84b5d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d1fb0 to 0xe05d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84555f40 INFO: task kworker/0:59:3801 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdff71d28 to 0xdff71d70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:287:3803 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:287 state:D stack:0 pid:3803 tgid:3803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06a1d84 r8:00000002 r7:60000113 r6:e06a1d8c r5:84b5e000 r4:84b5e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b5e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:848a8f8c r4:848a8c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b5e000 r8:84af0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r4:00000000 r5:8455378c r4:84553400 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033900 r5:848a978c r4:848a9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85030000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030000 r8:80287e08 r7:e06b9e60 r6:84883a80 r5:85040c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850337c0 INFO: task kworker/1:289:3808 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ce915000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:3809 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06cdd84 r8:00000002 r7:60000013 r6:e06cdd8c r5:85041800 r4:85041800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85041800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033f40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85041800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848aa78c r4:848aa400 r7:ddde2d80 r6:83018200 r5:848aa78c r4:85030080 r10:00000000 r9:85030080 r8:80287e08 r7:e06c9e60 r6:84883b00 r5:85041800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d20: cecd5000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033a80 r5:848a9b8c r4:848a9800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 Workqueue: events bpf_prog_free_deferred r5:85040000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033b40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85040000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848a9f8c r4:848a9c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848a9f8c r4:85030180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85040000 r8:850301ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030180 r8:80287e08 r7:e06cde60 r6:84883c00 r5:85040000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850339c0 INFO: task kworker/1:292:3812 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cf476000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:3814 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:3814 tgid:3814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:85044800 r4:85044800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85044800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033d40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85044800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd85000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848aa38c r4:848aa000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848aa38c r4:85030200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85044800 r8:8503022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030200 r8:80287e08 r7:e06cde60 r6:84883c80 r5:85044800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r5:8455378c r4:84553400 r4:8483a980 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3817 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3817 tgid:3817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e1d84 r8:00000002 r7:60000113 r6:e05e1d8c r5:85043000 r4:85043000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85035c00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85043000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff89000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8439778c r4:84397400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439778c r4:84883d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85043000 r8:84883d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84883d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84883d00 r8:80287e08 r7:e05d5e60 r6:84883d80 r5:85043000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85035680 INFO: task kworker/0:60:3817 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cf54d000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848aab8c r4:848aa800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848aab8c r4:85030280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85045400 r8:850302ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030280 r8:80287e08 r7:e06cde60 r6:84883e00 r5:85045400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85033e40 INFO: task kworker/1:294:3818 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85046000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85035b40 r5:8439738c r4:84397000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: cfee9000 dfae3000 00000001 80239b98 7f14f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:00000001 Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:3823 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:3823 tgid:3823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06e9d84 r8:00000002 r7:60000113 r6:e06e9d8c r5:85046c00 r4:85046c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3400 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85046c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0167000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848ab78c r4:848ab400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ab78c r4:85030300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046c00 r8:8503032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030300 r8:80287e08 r7:e06e5e60 r6:84883f80 r5:85046c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85033fc0 INFO: task kworker/1:295:3823 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: cffdb000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85035f80 r5:84397f8c r4:84397c00 r7:dddced80 r6:83018000 r5:84397f8c r4:8491c000 r10:00000000 r9:8491c000 r8:80287e08 r7:e05e1e60 r6:8491c080 r5:85043c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d024f000 dfae3000 00000001 80239b98 7f14f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3828 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06f1d84 r8:00000002 r7:60000113 r6:e06f1d8c r5:84b58000 r4:84b58000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b58000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85035d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b58000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff99000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84397b8c r4:84397800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84397b8c r4:8491c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b58000 r8:8491c12c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e06edd84 r8:00000002 r7:60000113 r6:e06edd8c r5:84b5ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r9:83018205 r8:84b5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r5:848aaf8c r4:848aac00 r10:61c88647 r9:84b5ec00 r8:850303ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff71d28 to 0xdff71d70) r5:80050013 r4:80239bb0 r4:dff71dc0 r5:00001000 r4:dfb07000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:64:3830 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:64 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06f5d84 r8:00000002 r7:60000113 r6:e06f5d8c r5:85058000 r4:85058000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85058000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850333c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85058000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b6b8c r4:844b6800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b6b8c r4:8491c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85058000 r8:8491c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491c280 r8:80287e08 r7:e06b5e60 r6:8491c300 r5:85058000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f5fb0 to 0xe06f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85035f40 INFO: task kworker/0:64:3830 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d0b74000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3833 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:3833 tgid:3833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06f9d84 r8:00000002 r7:60000113 r6:e06f9d8c r5:85058c00 r4:85058c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85058c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490aa40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85058c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa51000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84902f8c r4:84902c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84902f8c r4:8491c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85058c00 r8:8491c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491c380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491c380 r8:80287e08 r7:e06f5e60 r6:8491c400 r5:85058c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f9fb0 to 0xe06f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85059800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031000 r5:8490038c r4:84900000 r7:dddced80 r6:83018000 r5:8490038c r4:8491c480 r10:00000000 r9:8491c480 r8:80287e08 r7:e06f9e60 r6:8491c500 r5:85059800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r5:8455378c r4:84553400 r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 task:kworker/0:67 state:D stack:0 pid:3837 tgid:3837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:8505a400 r4:8505a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031bc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0741000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8490078c r4:84900400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8490078c r4:8491c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505a400 r8:8491c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491c580 r8:80287e08 r7:e06f9e60 r6:8491c600 r5:8505a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0705fb0 to 0xe0705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850310c0 INFO: task kworker/0:67:3837 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d0b74000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:8505b000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3340 r5:848ab38c r4:848ab000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 r5:00001000 r4:dfb07000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:3841 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:3841 tgid:3841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0715d84 r8:00000002 r7:60000013 r6:e0715d8c r5:8505d400 r4:8505d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0715e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8505d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01bb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848abb8c r4:848ab800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848abb8c r4:85030480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505d400 r8:850304ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030480 r8:80287e08 r7:e06e9e60 r6:8491c700 r5:8505d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0715fb0 to 0xe0715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf3540 INFO: task kworker/1:298:3841 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d131b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:3843 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e071dd84 r8:00000002 r7:60000013 r6:e071dd8c r5:8505c800 r4:8505c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3b00 r5:848acb8c r4:848ac800 r7:ddde2d80 r6:83018200 r5:848acb8c r4:85030500 r10:00000000 r9:85030500 r8:80287e08 r7:e0715e60 r6:8491c780 r5:8505c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:3844 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0721d84 r8:00000002 r7:60000113 r6:e0721d8c r5:8505e000 r4:8505e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf36c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8505e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848abf8c r4:848abc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848abf8c r4:85030580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505e000 r8:850305ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030580 r8:80287e08 r7:e071de60 r6:8491c800 r5:8505e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf35c0 INFO: task kworker/1:300:3844 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d131b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:848ac38c r4:848ac000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ac38c r4:85030600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844b8000 r8:8503062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030600 r8:80287e08 r7:e071de60 r6:8491c880 r5:844b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf35c0 INFO: task kworker/1:301:3846 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d1bdd000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:302 state:D stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0701d84 r8:00000002 r7:60000013 r6:e0701d8c r5:84bed400 r4:84bed400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bed400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0701e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bed400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0693000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848ac78c r4:848ac400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ac78c r4:85030680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bed400 r8:850306ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030680 r8:80287e08 r7:e071de60 r6:85030700 r5:84bed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0701fb0 to 0xe0701ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 r5:00001000 r4:dfb07000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0739d84 r8:00000002 r7:60000013 r6:e0739d8c r5:84bebc00 r4:84bebc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bebc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848acf8c r4:848acc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848acf8c r4:85030780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bebc00 r8:850307ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030780 r8:80287e08 r7:e071de60 r6:85030800 r5:84bebc00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf3c80 r5:848ad38c r4:848ad000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r5:8455378c r4:84553400 r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/1:305 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f5d84 r8:00000002 r7:60000013 r6:e04f5d8c r5:84bec800 r4:84bec800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bec800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84908040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bec800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb49000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848ad78c r4:848ad400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ad78c r4:85030a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bec800 r8:85030a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030a00 r8:80287e08 r7:e070de60 r6:85030a80 r5:84bec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f5fb0 to 0xe04f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf3b80 INFO: task kworker/1:305:3855 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d20a6000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:3859 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:84bee000 r4:84bee000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bee000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:848adf8c r4:848adc00 r10:61c88647 r9:84bee000 r8:85030b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d20a6000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:307 state:D stack:0 pid:3861 tgid:3861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0749d84 r8:00000002 r7:60000013 r6:e0749d8c r5:84a7d400 r4:84a7d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84908140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb95000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848adb8c r4:848ad800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848adb8c r4:85030c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7d400 r8:85030c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030c00 r8:80287e08 r7:e0735e60 r6:85030c80 r5:84a7d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0749fb0 to 0xe0749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84908100 INFO: task kworker/1:307:3861 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d27cd000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:308 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b90000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0565e08 r9:83018205 r8:84b90000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b90c00 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfc61000 r5:848aeb8c r4:848ae800 r10:61c88647 r9:84b90c00 r8:8491c92c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d2a1e000 dfae3000 00000001 80239b98 7f14f000 00000001 r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:3866 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0569d84 r8:00000002 r7:60000013 r6:e0569d8c r5:84b91800 r4:84b91800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b91800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0569e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84908780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848ae78c r4:848ae400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ae78c r4:85030e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b91800 r8:85030e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85030e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85030e00 r8:80287e08 r7:e0565e60 r6:85030f00 r5:84b91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0569fb0 to 0xe0569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849084c0 INFO: task kworker/1:309:3866 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d2a1e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b92400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84908b80 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b92400 r8:85030fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:3870 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:3870 tgid:3870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e074dd84 r8:00000002 r7:60000113 r6:e074dd8c r5:84b93c00 r4:84b93c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b93c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848322c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe77000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84900f8c r4:84900c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84900f8c r4:8491c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b93c00 r8:8491c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491c980 r8:80287e08 r7:e06f9e60 r6:847e3000 r5:84b93c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe074dfb0 to 0xe074dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85031e80 INFO: task kworker/0:69:3870 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d2cf6000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8455378c r4:84553400 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:311 state:D stack:0 pid:3872 tgid:3872 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844bbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84908d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe29000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848af78c r4:848af400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848af78c r4:847e3100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844bbc00 r8:847e312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3100 r8:80287e08 r7:e05f9e60 r6:8491ca80 r5:844bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84908c80 INFO: task kworker/1:312:3874 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d3205000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc6-syzkaller #0 r4:844bc800 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847e3180 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d3618000 dfae3000 00000001 80239b98 7f14f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:84839400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3880 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3880 tgid:3880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:844be000 r4:844be000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844be000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844be000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0689000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8490178c r4:84901400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8490178c r4:8491cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844be000 r8:8491cc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8491cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491cc00 r8:80287e08 r7:e06f9e60 r6:8491cc80 r5:844be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832300 INFO: task kworker/0:70:3880 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d3f0e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:848b438c r4:848b4000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d3f0e000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e076dd84 r8:00000002 r7:60000113 r6:e076dd8c r5:844bec00 r4:844bec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844bec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85038240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b478c r4:848b4400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848b478c r4:847e3300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844bec00 r8:847e332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3300 r8:80287e08 r7:e0765e60 r6:8491cd80 r5:844bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe076dfb0 to 0xe076dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85038140 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e3380 r8:80287e08 r7:e076de60 r6:8491ce00 r5:84beec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85038280 INFO: task kworker/1:317:3886 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d43f3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:3887 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0779d84 r8:00000002 r7:60000113 r6:e0779d8c r5:8505ec00 r4:8505ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b4b8c r4:848b4800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848b4b8c r4:847e3480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505ec00 r8:847e34ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3480 r8:80287e08 r7:e0775e60 r6:8491ce80 r5:8505ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0779fb0 to 0xe0779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85038280 INFO: task kworker/1:318:3887 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d43f3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfb07000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:319:3889 blocked for more than 455 seconds. r4:844b9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0781e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847e3400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85038380 INFO: task kworker/1:319:3889 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d43f3000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85038880 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b578c r4:848b5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:847e3500 r8:80287e08 r7:e0781e60 r6:8491cf80 r5:844b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0785fb0 to 0xe0785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850386c0 INFO: task kworker/1:320:3892 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d4838000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:3894 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e075dd84 r8:00000002 r7:60000113 r6:e075dd8c r5:84b93000 r4:84b93000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b93000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85038900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b93000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0025000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b5b8c r4:848b5800 r7:ddde2d80 r6:83018200 r5:848b5b8c r4:847e3580 r10:00000000 r9:847e3580 r8:80287e08 r7:e0785e60 r6:847e3600 r5:84b93000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff71d28 to 0xdff71d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfb07000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:322 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85038e00 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b96000 r8:847e36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:3898 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:3898 tgid:3898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0789d84 r8:00000002 r7:60000113 r6:e0789d8c r5:84b96c00 r4:84b96c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b96c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0789e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85038b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e006f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b5f8c r4:848b5c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848b5f8c r4:847e3780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b96c00 r8:847e37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3780 r8:80287e08 r7:e0761e60 r6:847e3800 r5:84b96c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0789fb0 to 0xe0789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85038ac0 INFO: task kworker/1:323:3898 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d4dde000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r5:00001000 r4:dfb07000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r5:8455378c r4:84553400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b94800 r8:847e39ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3980 r8:80287e08 r7:e0761e60 r6:847e3a00 r5:84b94800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0795fb0 to 0xe0795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85038d40 INFO: task kworker/1:325:3902 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d4dde000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:326:3903 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:326 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e079dd84 r8:00000002 r7:60000113 r6:e079dd8c r5:85060c00 r4:85060c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85060c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e079de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84832300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85060c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b6b8c r4:848b6800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848b6b8c r4:847e3a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85060c00 r8:847e3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3a80 r8:80287e08 r7:e0795e60 r6:84385000 r5:85060c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe079dfb0 to 0xe079dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d5591000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483a980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84839400 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849452c0 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b778c r4:848b7400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848b778c r4:847e3b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85061800 r8:847e3b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3b00 r8:80287e08 r7:e0795e60 r6:84385080 r5:85061800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a9fb0 to 0xe07a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84945080 INFO: task kworker/1:327:3906 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d5591000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:3907 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:e07add84 r8:00000002 r7:60000013 r6:e07add8c r5:85063000 r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b738c r4:848b7000 r7:ddde2d80 r6:83018200 r5:848b738c r4:847e3b80 r10:00000000 r9:847e3b80 r8:80287e08 r7:e07a9e60 r6:84385100 r5:85063000 r4:84945080 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:3909 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:3909 tgid:3909 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07b5d84 r8:00000002 r7:60000113 r6:e07b5d8c r5:85062400 r4:85062400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85062400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945440 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b7b8c r4:848b7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d5b8e000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483a980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84839400 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945500 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:3913 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07c5d84 r8:00000002 r7:60000113 r6:e07c5d8c r5:85064800 r4:85064800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85064800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945a00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85064800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa2d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b8f8c r4:848b8c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848b8f8c r4:847e3d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85064800 r8:847e3d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3d00 r8:80287e08 r7:e07bde60 r6:84385280 r5:85064800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c5fb0 to 0xe07c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84945380 INFO: task kworker/1:331:3913 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d5fe5000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945640 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b838c r4:848b8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:847e3d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:333:3917 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:3917 tgid:3917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c1d84 r8:00000002 r7:60000113 r6:e06c1d8c r5:85066000 r4:85066000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85066000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85066000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b878c r4:848b8400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848b878c r4:847e3e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85066000 r8:847e3eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e3e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e3e80 r8:80287e08 r7:e07c5e60 r6:84385380 r5:85066000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c1fb0 to 0xe06c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84945900 INFO: task kworker/1:333:3917 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d5fe5000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:84839400 task:kworker/1:334 state:D stack:0 pid:3919 tgid:3919 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07dde08 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847e3e00 Exception stack(0xe07ddfb0 to 0xe07ddff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849457c0 INFO: task kworker/1:334:3919 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d5fe5000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:335:3921 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:335 state:D stack:0 pid:3921 tgid:3921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07e5d84 r8:00000002 r7:60000113 r6:e07e5d8c r5:84b99800 r4:84b99800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b99800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84945cc0 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b978c r4:848b9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d6492000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:336 state:D stack:0 pid:3923 tgid:3923 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfa7d000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe07f9fb0 to 0xe07f9ff8) r4:84945a40 Call trace: [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: d6865000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:3926 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84b9bc00 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8490138c r4:8439b000 r4:8439b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b000 r8:80287e08 r7:e07e5e60 r6:84385580 r5:84b9bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0801fb0 to 0xe0801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84945d00 INFO: task kworker/1:337:3926 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d6865000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b9b8c r4:848b9800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: d6cce000 dfae3000 00000001 80239b98 7f14f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r5:00001000 r4:dfb07000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84825a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848b9f8c r4:848b9c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848b9f8c r4:8439b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9e000 r8:8439b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b100 r8:80287e08 r7:e0801e60 r6:84385680 r5:84b9e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe080dfb0 to 0xe080dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84825c80 INFO: task kworker/1:339:3929 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d6cce000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:3932 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:dff8f000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8439b180 Exception stack(0xe0815fb0 to 0xe0815ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred 1d20: d6ff5000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff71fb0 to 0xdff71ff8) r4:84839400 INFO: task kworker/1:341:3933 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0819d84 r8:00000002 r7:60000113 r6:e0819d8c r5:84b9c800 r4:84b9c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0819e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849081c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd87000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848ba78c r4:848ba400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848ba78c r4:8439b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9c800 r8:8439b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b200 r8:80287e08 r7:e0815e60 r6:84385780 r5:84b9c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0819fb0 to 0xe0819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84825b00 INFO: task kworker/1:341:3933 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d6ff5000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:342 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0821e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848bab8c r4:848ba800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bab8c r4:8439b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9a400 r8:8439b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b280 r8:80287e08 r7:e0815e60 r6:84385800 r5:84b9a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0821fb0 to 0xe0821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85038f00 INFO: task kworker/1:342:3936 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d71e0000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84839400 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491a000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848baf8c r4:848bac00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848baf8c r4:8439b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85066c00 r8:8439b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b300 r8:80287e08 r7:e0815e60 r6:84385880 r5:85066c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0835fb0 to 0xe0835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491a040 INFO: task kworker/1:343:3938 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d771c000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:344:3940 blocked for more than 456 seconds. [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dff6d000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8439b380 Exception stack(0xe083dfb0 to 0xe083dff8) r4:8491a2c0 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfb07000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:dfffb000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491a340 INFO: task kworker/1:345:3942 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d7ae6000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:3945 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:3945 tgid:3945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0865d84 r8:00000002 r7:60000013 r6:e0865d8c r5:85068000 r4:85068000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85068000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0865e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491a3c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85068000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848bbb8c r4:848bb800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bbb8c r4:8439b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85068000 r8:8439b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b480 r8:80287e08 r7:e0845e60 r6:84385a00 r5:85068000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0865fb0 to 0xe0865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491a340 INFO: task kworker/1:346:3945 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:3947 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:3947 tgid:3947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0871d84 r8:00000002 r7:60000013 r6:e0871d8c r5:8506a400 r4:8506a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0871e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491a500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8506a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848bbf8c r4:848bbc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bbf8c r4:8439b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506a400 r8:8439b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b500 r8:80287e08 r7:e0845e60 r6:84385a80 r5:8506a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0871fb0 to 0xe0871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491a540 INFO: task kworker/1:347:3947 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d7e5b000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491ab00 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d7e5b000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:dff71dc0 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:84839400 task:kworker/1:349 state:D stack:0 pid:3950 tgid:3950 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bc78c r4:8439b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85069800 r8:8439b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b600 r8:80287e08 r7:e0879e60 r6:84385b80 r5:85069800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe087dfb0 to 0xe087dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491a640 INFO: task kworker/1:349:3950 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d82f2000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:350:3952 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:350 state:D stack:0 pid:3952 tgid:3952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0895d84 r8:00000002 r7:60000113 r6:e0895d8c r5:8506c800 r4:8506c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0895e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491aa00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8506c800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e017f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848bcb8c r4:848bc800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bcb8c r4:8439b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506c800 r8:8439b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d82f2000 dfae3000 00000001 80239b98 7f14f000 00000001 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:8506d400 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e056b000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8439b700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:dff71dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:3957 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:3957 tgid:3957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e089dd84 r8:00000002 r7:60000013 r6:e089dd8c r5:8506e000 r4:8506e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8506e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e089de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491ae80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0593000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848bdb8c r4:848bd800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bdb8c r4:8439b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506e000 r8:8439b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b780 r8:80287e08 r7:e0899e60 r6:84385d00 r5:8506e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe089dfb0 to 0xe089dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491ab40 INFO: task kworker/1:352:3957 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d8514000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84839400 task:kworker/1:353 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491ad40 r5:848bd78c r4:848bd400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8506ec00 r8:8439b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483a980 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8506b000 r4:8291a680 r4:00000000 r4:00000000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848bdf8c r4:848bdc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bdf8c r4:8439b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8506b000 r8:8439b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439b880 r8:80287e08 r7:e089de60 r6:84385e00 r5:8506b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08a5fb0 to 0xe08a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491adc0 INFO: task kworker/1:354:3961 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d8cba000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:3963 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:3963 tgid:3963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e08a9d84 r8:00000002 r7:60000013 r6:e08a9d8c r5:84b9b000 r4:84b9b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:848be38c r4:848be000 r7:ddde2d80 r6:83018200 r5:848be38c r4:8439b900 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r4:dff71dc0 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a70000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84a70000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe08adfb0 to 0xe08adff8) r4:850b4080 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d909f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:3967 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e08b1d84 r8:00000002 r7:60000013 r6:e08b1d8c r5:84a70c00 r4:84a70c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a70c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b4440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848beb8c r4:848be800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848beb8c r4:8439ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a70c00 r8:8439ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439ba00 r8:80287e08 r7:e08ade60 r6:84385f80 r5:84a70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08b1fb0 to 0xe08b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b42c0 INFO: task kworker/1:357:3967 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d909f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a71800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b5e08 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d909f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:3971 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e08b9d84 r8:00000002 r7:60000013 r6:e08b9d8c r5:84a72400 r4:84a72400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a72400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b4740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a72400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848bf38c r4:848bf000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bf38c r4:8439bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a72400 r8:8439bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439bb00 r8:80287e08 r7:e08b5e60 r6:850bc080 r5:84a72400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08b9fb0 to 0xe08b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b4540 INFO: task kworker/1:359:3971 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d9610000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r5:84a73000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b49c0 r5:848bfb8c r4:848bf800 r7:ddde2d80 r6:83018200 r5:848bfb8c r4:8439bb80 r4:8439bb80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:dff71dc0 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84a73c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b48c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0649000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:848bf78c r4:848bf400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:848bf78c r4:8439bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a73c00 r8:8439bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439bc00 r8:80287e08 r7:e08bde60 r6:850bc180 r5:84a73c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08c1fb0 to 0xe08c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b4700 INFO: task kworker/1:361:3975 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d98a9000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:3977 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:362 state:D stack:0 pid:3977 tgid:3977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e08c5d84 r8:00000002 r7:60000113 r6:e08c5d8c r5:84a74800 r4:84a74800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a74800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b4ac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a74800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8439bc80 r8:80287e08 r7:e08bde60 r6:850bc200 r5:84a74800 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:3979 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e08edd84 r8:00000002 r7:60000013 r6:e08edd8c r5:84a75400 r4:84a75400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a75400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08ede08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bb8c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a75400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84901b8c r4:84901800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84901b8c r4:8439bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a75400 r8:8439bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439bd00 r8:80287e08 r7:e08c5e60 r6:850bc300 r5:84a75400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08edfb0 to 0xe08edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b4a40 INFO: task kworker/1:363:3979 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d9c82000 dfae3000 00000001 80239b98 7f14f000 00000001 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0875d84 r8:00000002 r7:60000113 r6:e0875d8c r5:84a76000 r4:84a76000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a76000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0875e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c3600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a76000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0103000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8490238c r4:84902000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8490238c r4:850bc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a76000 r8:850bc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bc280 r8:80287e08 r7:e06f9e60 r6:850bc380 r5:84a76000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0875fb0 to 0xe0875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850bba00 INFO: task kworker/0:71:3981 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: d9c82000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:3983 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:3983 tgid:3983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e08f1d84 r8:00000002 r7:60000113 r6:e08f1d8c r5:84a76c00 r4:84a76c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a76c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b4cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512838c r4:85128000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512838c r4:8439bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a76c00 r8:8439bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439bd80 r8:80287e08 r7:e08ede60 r6:850bc400 r5:84a76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f1fb0 to 0xe08f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b4b80 INFO: task kworker/1:364:3983 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 Exception stack(0xdff71d28 to 0xdff71d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r4:dff71dc0 r4:00000000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8483a980 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:365:3984 blocked for more than 456 seconds. Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e08f5d84 r8:00000002 r7:60000113 r6:e08f5d8c r5:850f8000 r4:850f8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850f8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b4e40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0717000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512878c r4:85128400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512878c r4:8439be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f8000 r8:8439be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439be00 r8:80287e08 r7:e08f1e60 r6:850bc480 r5:850f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f5fb0 to 0xe08f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b4c80 INFO: task kworker/1:365:3984 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: da593000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:3986 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e08f9d84 r8:00000002 r7:60000013 r6:e08f9d8c r5:850f8c00 r4:850f8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850f8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84947340 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0725000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85128b8c r4:85128800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85128b8c r4:8439be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f8c00 r8:8439beac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439be80 r8:80287e08 r7:e08f5e60 r6:850bc500 r5:850f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f9fb0 to 0xe08f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b4700 INFO: task kworker/1:366:3986 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: da593000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:3989 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:3989 tgid:3989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4909d84 r8:00000002 r7:60000113 r6:e4909d8c r5:850fb000 r4:850fb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4909e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8491afc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85128f8c r4:85128c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85128f8c r4:8439bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fb000 r8:8439bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439bf00 r8:80287e08 r7:e08f9e60 r6:850bc580 r5:850fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4909fb0 to 0xe4909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b4ec0 INFO: task kworker/1:367:3989 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: da983000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:3991 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:3991 tgid:3991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4911d84 r8:00000002 r7:60000113 r6:e4911d8c r5:850fa400 r4:850fa400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fa400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4911e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850be200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0849000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85129b8c r4:85129800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85129b8c r4:8439bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fa400 r8:8439bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8439bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8439bf80 r8:80287e08 r7:e4909e60 r6:850bc600 r5:850fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4911fb0 to 0xe4911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491a6c0 INFO: task kworker/1:368:3991 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: da983000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:3992 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4915d84 r8:00000002 r7:60000113 r6:e4915d8c r5:850fbc00 r4:850fbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4915e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850be040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0745000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512938c r4:85129000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512938c r4:850b3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fbc00 r8:850b302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3000 r8:80287e08 r7:e4911e60 r6:850bc680 r5:850fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4915fb0 to 0xe4915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b4fc0 INFO: task kworker/1:369:3992 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dadbe000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:3995 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:3995 tgid:3995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4929d84 r8:00000002 r7:60000013 r6:e4929d8c r5:850f9800 r4:850f9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850f9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4929e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850be140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0827000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512978c r4:85129400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512978c r4:850b3080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f9800 r8:850b30ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3080 r8:80287e08 r7:e4911e60 r6:850bc700 r5:850f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4929fb0 to 0xe4929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850be100 INFO: task kworker/1:370:3995 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dadbe000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:3998 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:3998 tgid:3998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4935d84 r8:00000002 r7:60000113 r6:e4935d8c r5:850fd400 r4:850fd400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fd400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4935e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850be340 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08c7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85129f8c r4:85129c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85129f8c r4:850b3100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fd400 r8:850b312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3100 r8:80287e08 r7:e4911e60 r6:850bc780 r5:850fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4935fb0 to 0xe4935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850be240 INFO: task kworker/1:371:3998 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: daf93000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:3999 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4939d84 r8:00000002 r7:60000113 r6:e4939d8c r5:850fc800 r4:850fc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4939e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850be480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4917000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512a38c r4:8512a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512a38c r4:850b3180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fc800 r8:850b31ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3180 r8:80287e08 r7:e4935e60 r6:850bc800 r5:850fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4939fb0 to 0xe4939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850be240 INFO: task kworker/1:372:3999 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: daf93000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850be800 r5:8512ab8c r4:8512a800 r7:ddde2d80 r6:83018200 r5:8512ab8c r4:850b3200 r10:00000000 r9:850b3200 r8:80287e08 r7:e4939e60 r6:850bc880 r5:850fec00 r4:850be4c0 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:4002 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:4002 tgid:4002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4945d84 r8:00000002 r7:60000113 r6:e4945d8c r5:850fe000 r4:850fe000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fe000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4945e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850be700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e493d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512a78c r4:8512a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512a78c r4:850b3280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fe000 r8:850b32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3280 r8:80287e08 r7:e4941e60 r6:850bc900 r5:850fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4945fb0 to 0xe4945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850be4c0 INFO: task kworker/1:374:4002 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: db313000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e495de08 r5:8512af8c r4:8512ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff71fb0 to 0xdff71ff8) INFO: task kworker/1:376:4007 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4931d84 r8:00000002 r7:60000113 r6:e4931d8c r5:85009800 r4:85009800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85009800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4931e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bec40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85009800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512b78c r4:8512b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512b78c r4:850b3380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85009800 r8:850b33ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3380 r8:80287e08 r7:e495de60 r6:850b3400 r5:85009800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4931fb0 to 0xe4931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850be880 INFO: task kworker/1:376:4007 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: db6cc000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8455378c r4:84553400 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 INFO: task kworker/1:377:4009 blocked for more than 456 seconds. r5:8500a400 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8500a400 r8:850b34ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff71d28 to 0xdff71d70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8500b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4965e08 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:8512bb8c r4:8512b800 r4:850b3580 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dbaf0000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:4014 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:4014 tgid:4014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4969d84 r8:00000002 r7:60000013 r6:e4969d8c r5:8500bc00 r4:8500bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4969e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850bee40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8500bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512bf8c r4:8512bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512bf8c r4:850b3680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500bc00 r8:850b36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3680 Exception stack(0xe4969fb0 to 0xe4969ff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8512c78c r4:8512c400 r10:61c88647 r9:8500c800 r8:850b37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dc168000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8483a980 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8500d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4971e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8512c38c r4:8512c000 r10:61c88647 r9:8500d400 r8:850b392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r5:00001000 r4:dfb07000 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8512cb8c r4:8512c800 Exception stack(0xe4975fb0 to 0xe4975ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d7100 INFO: task kworker/1:382:4019 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dc3e8000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:8500ec00 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8512cf8c r4:8512cc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8500ec00 r8:850b3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff71d28 to 0xdff71d70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4024 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4024 tgid:4024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e497dd84 r8:00000002 r7:60000013 r6:e497dd8c r5:85008c00 r4:85008c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85008c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e497de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85008c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512d38c r4:8512d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512d38c r4:850b3b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85008c00 r8:850b3bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3b80 r8:80287e08 r7:e4979e60 r6:850b3c00 r5:85008c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe497dfb0 to 0xe497dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d7200 INFO: task kworker/1:384:4024 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85008000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85008000 r8:850b3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff71d28 to 0xdff71d70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:84839400 INFO: task kworker/1:386:4027 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4027 tgid:4027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8985d84 r8:00000002 r7:60000113 r6:e8985d8c r5:8505bc00 r4:8505bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8985e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8505bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512db8c r4:8512d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512db8c r4:850b3e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505bc00 r8:850b3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3e00 r8:80287e08 r7:e07a1e60 r6:850b3e80 r5:8505bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8985fb0 to 0xe8985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d7500 INFO: task kworker/1:386:4027 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dcd3f000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8455378c r4:84553400 r4:8483a980 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7840 r5:8512df8c r4:8512dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512df8c r4:850b3d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85168000 r8:850b3dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b3d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b3d80 r8:80287e08 r7:e8985e60 r6:850b3f00 r5:85168000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe898dfb0 to 0xe898dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d77c0 INFO: task kworker/1:387:4029 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dcfde000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:4033 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:4033 tgid:4033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8991d84 r8:00000002 r7:60000113 r6:e8991d8c r5:85168c00 r4:85168c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85168c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8991e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85168c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512e78c r4:8512e400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85168c00 r8:850b3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff71d28 to 0xdff71d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:84839400 Workqueue: events bpf_prog_free_deferred r4:85169800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8989e08 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516a400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0067000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512eb8c r4:8512e800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512eb8c r4:850e6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516a400 r8:850e61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e6180 r8:80287e08 r7:e8991e60 r6:850e6200 r5:8516a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8999fb0 to 0xe8999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d7940 INFO: task kworker/1:390:4035 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dd2b7000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:391:4038 blocked for more than 456 seconds. Call trace: [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8512fb8c r4:8512f800 r7:ddde2d80 r6:83018200 r5:8512fb8c r4:850e6280 r10:00000000 r9:850e6280 r8:80287e08 r7:e8999e60 r6:850e6300 r5:8516b000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e89a1d84 r8:00000002 r7:60000113 r6:e89a1d8c r5:8516bc00 r4:8516bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8516bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89a1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e009b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8512ef8c r4:8512ec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512ef8c r4:850e6380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516bc00 r8:850e63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e6380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e6380 r8:80287e08 r7:e899de60 r6:850e6400 r5:8516bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89a1fb0 to 0xe89a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d7dc0 INFO: task kworker/1:392:4039 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: dd605000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:393:4041 blocked for more than 456 seconds. r4:8516c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89a5e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8512f38c r4:8512f000 r10:61c88647 r9:8516c800 r8:850e64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff71fb0 to 0xdff71ff8) INFO: task kworker/0:72:4044 blocked for more than 456 seconds. r4:84a90000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89a9e08 r5:00001000 r4:e04f1000 r5:8490278c r4:84902400 r7:dddced80 r6:83018000 r5:8490278c r4:850bca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:850bca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850bca00 r8:80287e08 r7:e06f9e60 r6:850bca80 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89a9fb0 to 0xe89a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c39c0 INFO: task kworker/0:72:4044 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: ddd21000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:4046 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84a93c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89b9e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84902b8c r4:84902800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850bcb00 r8:80287e08 r7:e06f9e60 r6:850bcb80 r5:84a93c00 task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:dff71dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:4048 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e89b5d84 r8:00000002 r7:60000113 r6:e89b5d8c r5:84a93000 r4:84a93000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a93000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89b5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490a5c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a93000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8490338c r4:84903000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8490338c r4:850bcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a93000 r8:850bcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850bcc00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 r5:00001000 r4:dfb07000 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff71fb0 to 0xdff71ff8) INFO: task kworker/1:394:4049 blocked for more than 456 seconds. r4:84a94800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89c5e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r5:8455378c r4:84553400 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:4052 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:4052 tgid:4052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e89d1d84 r8:00000002 r7:60000113 r6:e89d1d8c r5:84a95400 r4:84a95400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a95400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89d1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d7fc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a95400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513db8c r4:8513d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513db8c r4:850e6600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a95400 r8:850e662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e6600 r8:80287e08 r7:e899de60 r6:850bcd80 r5:84a95400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89d1fb0 to 0xe89d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ec680 INFO: task kworker/1:395:4052 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: de703000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4054 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/1:396 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89d9e08 r5:00001000 r4:e07a3000 r5:8512ff8c r4:8512fc00 r10:61c88647 r9:84a96000 r8:850e66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:dff71dc0 r5:00001000 r4:dfb07000 r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:4055 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:4055 tgid:4055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e89ddd84 r8:00000002 r7:60000113 r6:e89ddd8c r5:84a90c00 r4:84a90c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a90c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89dde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ec8c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513c38c r4:8513c000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513c38c r4:850e6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90c00 r8:850e672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e6700 r8:80287e08 r7:e89d1e60 r6:850bce80 r5:84a90c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89ddfb0 to 0xe89ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850eca00 INFO: task kworker/1:397:4055 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 Exception stack(0xdff71fb0 to 0xdff71ff8) INFO: task kworker/1:398:4057 blocked for more than 456 seconds. r5:84a96c00 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a96c00 r8:850e67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84b70c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ecb40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89ab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513cb8c r4:8513c800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513cb8c r4:850e6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b70c00 r8:850e682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e6800 r8:80287e08 r7:e89d1e60 r6:850bcf80 r5:84b70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89f1fb0 to 0xe89f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ec9c0 INFO: task kworker/1:399:4059 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: de906000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:401 state:D stack:0 pid:4063 tgid:4063 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8516d400 r8:850e692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: df053000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4067 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa09d84 r8:00000002 r7:60000113 r6:eaa09d8c r5:8516ec00 r4:8516ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8516ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ecf40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa11000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513d78c r4:8513d400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513d78c r4:850e6a00 r4:850e6a00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:dff71dc0 r5:00001000 r4:dfb07000 r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa1dd84 r8:00000002 r7:60000113 r6:eaa1dd8c r5:8516e000 r4:8516e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8516e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84833040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8516e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa25000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513df8c r4:8513dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513df8c r4:850e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8516e000 r8:850e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e6b00 r8:80287e08 r7:e89d1e60 r6:850e6b80 r5:8516e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ece80 INFO: task kworker/1:403:4068 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: df3fa000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85010000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r5:00001000 r4:eaa33000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85010000 r8:850e6c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e6c00 r8:80287e08 r7:eaa1de60 r6:850e6c80 r5:85010000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa29fb0 to 0xeaa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833080 INFO: task kworker/1:404:4070 is blocked on a mutex likely owned by task kworker/1:133:3463. task:kworker/1:133 state:R running task stack:0 pid:3463 tgid:3463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e0c00 r8:80200be4 r7:dff71d5c r6:ffffffff r5:848e0c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff71d28 to 0xdff71d70) 1d20: df5ea000 dfae3000 00000001 80239b98 7f14f000 00000001 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff71dc0 r5:dff71e08 r4:dff71dc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8455378c r4:84553400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8455378c r4:8483a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:8483a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff71fb0 to 0xdff71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r4:00000000 r5:8513e78c r4:8513e400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850e6d00 r8:80287e08 r7:eaa29e60 r6:850e6d80 r5:85010c00 r4:84833180 Call trace: 1d40: 82ac15a0 7f14f000 dfae3000 8280c928 82ac21c4 dff71da4 dff71da8 dff71d78 r4:00000000 r5:8455378c r4:84553400 r10:00000000 r9:8483a980 r8:80287e08 r7:dff55e60 r6:84944700 r5:848e0c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85011800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:406:4074 is blocked on a mutex likely owned by task kworker/1:139:3474. dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:407:4075 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:407 state:D stack:0 pid:4075 tgid:4075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e89c9d84 r8:00000002 r7:60000013 r6:e89c9d8c r5:85013000 r4:85013000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85013000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89c9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84833940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85013000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa61000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513ef8c r4:8513ec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513ef8c r4:850e6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85013000 r8:850e6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e6f00 r8:80287e08 r7:eaa3de60 r6:850e6f80 r5:85013000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89c9fb0 to 0xe89c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833400 INFO: task kworker/1:407:4075 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 7f5f1000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/0:75:4079 blocked for more than 457 seconds. r4:85012400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b3f080 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:75:4079 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 7f847000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:4080 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa49d84 r8:00000002 r7:60000113 r6:eaa49d8c r5:85015400 r4:85015400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85015400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eaa7f000 r5:8490378c r4:84903400 r10:61c88647 r9:85015400 r8:84b3f12c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:76:4080 is blocked on a mutex likely owned by task kworker/1:139:3474. r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:4081 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:4081 tgid:4081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:84b72400 r4:84b72400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b72400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84833e40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b72400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513fb8c r4:8513f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513fb8c r4:84bf5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b72400 r8:84bf50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf5080 r8:80287e08 r7:e89c9e60 r6:84b3f200 r5:84b72400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833900 INFO: task kworker/1:408:4081 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 7fe81000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:4084 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa79d84 r8:00000002 r7:60000013 r6:eaa79d8c r5:84b71800 r4:84b71800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b71800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84833a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b71800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513f38c r4:8513f000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513f38c r4:84bf5100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b71800 r8:84bf512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf5100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf5100 r8:80287e08 r7:eaa59e60 r6:84b3f280 r5:84b71800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa79fb0 to 0xeaa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848339c0 INFO: task kworker/1:409:4084 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 7fe81000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84b73c00 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bf5180 r8:80287e08 r7:eaa59e60 r6:84b3f300 r5:84b73c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa65fb0 to 0xeaa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833680 INFO: task kworker/1:410:4086 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 7fff6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:4089 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa89d84 r8:00000002 r7:60000113 r6:eaa89d8c r5:84b74800 r4:84b74800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b74800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c200 r5:844b738c r4:844b7000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b3f380 9fa0: 00000000 00000000 00000000 00000000 Call trace: r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 Exception stack(0xdff9dd28 to 0xdff9dd70) dd60: 80230ad0 80239bb0 80050013 ffffffff [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:00001000 r4:dfb17000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:4090 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:4090 tgid:4090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa95d84 r8:00000002 r7:60000113 r6:eaa95d8c r5:84b75400 r4:84b75400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b75400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b75400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0621000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b778c r4:844b7400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844b778c r4:84b3f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b75400 r8:84b3f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3f480 r8:80287e08 r7:eaa89e60 r6:84b3f500 r5:84b75400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848ca140 INFO: task kworker/0:78:4090 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80050013 r4:80239bb0 r4:dff9ddc0 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b76000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84825800 r5:8514438c r4:85144000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:411:4091 is blocked on a mutex likely owned by task kworker/1:139:3474. Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:412 state:D stack:0 pid:4093 tgid:4093 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84833fc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8513ff8c r4:8513fc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513ff8c r4:84bf5280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b76c00 r8:84bf52ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf5280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf5280 r8:80287e08 r7:eaaa1e60 r6:84b3f600 r5:84b76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833d40 INFO: task kworker/1:412:4093 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 80868000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c9000 r5:8514478c r4:85144400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bf5300 r8:80287e08 r7:eaaa1e60 r6:84b3f680 r5:84b73000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe085dfb0 to 0xe085dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84833540 INFO: task kworker/1:413:4096 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 80d08000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84b20c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4921e08 r9:83018205 r8:84b20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 r5:8514538c r4:85145000 r10:61c88647 r9:84b20c00 r8:84bf53ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:84553b8c r4:84553800 r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 task:kworker/1:415 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4949e08 r5:00001000 r4:dfae3000 r5:85144b8c r4:85144800 r10:61c88647 r9:84b21800 r8:84bf542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4102 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4102 tgid:4102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaab1d84 r8:00000002 r7:60000013 r6:eaab1d8c r5:84b20000 r4:84b20000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b20000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c92c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b20000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85144f8c r4:85144c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85144f8c r4:84bf5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b20000 r8:84bf54ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf5480 r8:80287e08 r7:e4921e60 r6:84b3f800 r5:84b20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c9400 INFO: task kworker/1:416:4102 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 81157000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85145b8c r4:85145800 r4:84bf5500 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8151a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 r5:84553b8c r4:84553800 Exception stack(0xdff9dfb0 to 0xdff9dff8) Workqueue: events bpf_prog_free_deferred [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:844b7b8c r4:844b7800 r4:84bf5600 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xdff9dd28 to 0xdff9dd70) dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:dff5d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdff9dfb0 to 0xdff9dff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 r5:85145f8c r4:85145c00 r10:00000000 r9:84bf5800 r8:80287e08 r7:eaaa9e60 r6:84bf5880 r5:85013c00 INFO: task kworker/1:420:4111 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 818ea000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:4113 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaac9d84 r8:00000002 r7:60000113 r6:eaac9d8c r5:84b23c00 r4:84b23c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b23c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c9b80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0005000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514638c r4:85146000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514638c r4:84bf5900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b23c00 r8:84bf592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf5900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf5900 r8:80287e08 r7:eaa91e60 r6:84b3f880 r5:84b23c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c9980 INFO: task kworker/1:421:4113 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 task:kworker/1:422 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8514678c r4:85146400 r10:61c88647 r9:84b25400 r8:84bf59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eaad9d84 r8:00000002 r7:60000013 r6:eaad9d8c r5:84b26c00 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05fd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514778c r4:85147400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514778c r4:84bf5a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b26c00 r8:84bf5a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf5a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf5a00 r8:80287e08 r7:eaad1e60 r6:84b3f980 r5:84b26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad9fb0 to 0xeaad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c9c80 INFO: task kworker/1:423:4117 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 81fce000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:4118 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:4118 tgid:4118 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85018000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c9e40 r5:85146b8c r4:85146800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:4121 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:4121 tgid:4121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaad5d84 r8:00000002 r7:60000013 r6:eaad5d8c r5:85018c00 r4:85018c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85018c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cab00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85018c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0575000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85146f8c r4:85146c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85146f8c r4:84bf5b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018c00 r8:84bf5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf5b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf5b80 r8:80287e08 r7:eaad9e60 r6:84bf5c00 r5:85018c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c9f00 INFO: task kworker/1:425:4121 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 82432000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bf5c80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfb17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036600 r5:85147f8c r4:85147c00 r10:61c88647 r9:8501a400 r8:84bf5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4126 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4126 tgid:4126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaae5d84 r8:00000002 r7:60000113 r6:eaae5d8c r5:8501bc00 r4:8501bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0613000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85147b8c r4:85147800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85147b8c r4:84bf5e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501bc00 r8:84bf5eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf5e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf5e80 r8:80287e08 r7:eaae1e60 r6:84bf5f00 r5:8501bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae5fb0 to 0xeaae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850362c0 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8501b000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3c600 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8501b000 r8:84b3fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3fa00 r8:80287e08 r7:eaa89e60 r6:84bf5f80 r5:8501b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3c240 INFO: task kworker/0:79:4130 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8288b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:8501e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8514c38c r4:84931000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r5:00001000 r4:e06ab000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84931180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931180 r8:80287e08 r7:eaaf9e60 r6:84b3fa80 r5:84b24800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850367c0 INFO: task kworker/1:430:4134 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 82ed4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:4135 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850a8f8c r4:850a8c00 r10:61c88647 r9:84b26000 r8:84b3fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c3c0 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:00000000 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred r4:84b23000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 r5:8514cf8c r4:8514cc00 r10:61c88647 r9:84b23000 r8:8493112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4139 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab11d84 r8:00000002 r7:60000013 r6:eab11d8c r5:84b22400 r4:84b22400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b22400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b22400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514cb8c r4:8514c800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514cb8c r4:84931200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b22400 r8:8493122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931200 r8:80287e08 r7:eab05e60 r6:84b3fc80 r5:84b22400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab11fb0 to 0xeab11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85036bc0 INFO: task kworker/1:432:4139 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 836f0000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eab15d84 r8:00000002 r7:60000113 r6:eab15d8c r5:84bc0000 r4:00000000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bc0000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514d78c r4:8514d400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514d78c r4:84931280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc0000 r8:849312ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931280 r8:80287e08 r7:eab05e60 r6:84b3fd00 r5:84bc0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85036bc0 INFO: task kworker/1:433:4141 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 836f0000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:84bc0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r9:83018205 r8:84bc0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 r5:8514d38c r4:8514d000 r10:61c88647 r9:84bc0c00 r8:8493132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 83cb2000 dfafb000 00000001 80239b98 7f151000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cab40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bc1800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514db8c r4:8514d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514db8c r4:84931380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc1800 r8:849313ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931380 r8:80287e08 r7:eab15e60 r6:84b3fe00 r5:84bc1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85036d80 INFO: task kworker/1:435:4145 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 83cb2000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4147 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:84bc2400 r4:84bc2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bc2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab21e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85037040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bc2400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514df8c r4:8514dc00 r7:ddde2d80 r6:83018200 r5:8514df8c r4:84931400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 Workqueue: events bpf_prog_free_deferred r5:84bc3000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85037240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bc3000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514e38c r4:8514e000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514e38c r4:84931480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc3000 r8:849314ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931480 r8:80287e08 r7:eab21e60 r6:84b3ff00 r5:84bc3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85037100 INFO: task kworker/1:437:4149 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 83ede000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84bc3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 r5:8514e78c r4:8514e400 r10:61c88647 r9:84bc3c00 r8:8493152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:4153 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab2dd84 r8:00000002 r7:60000113 r6:eab2dd8c r5:84bc4800 r4:84bc4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bc4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab2de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85037440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bc4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514eb8c r4:8514e800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514eb8c r4:84931580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bc4800 r8:849315ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931580 r8:80287e08 r7:eab29e60 r6:84b3d000 r5:84bc4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85037340 INFO: task kworker/1:439:4153 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 84224000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514ef8c r4:8514ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:4157 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:4157 tgid:4157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab3dd84 r8:00000002 r7:60000113 r6:eab3dd8c r5:84bc6000 r4:84bc6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bc6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8514f38c r4:8514f000 r4:84931680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: 845c6000 dfafb000 00000001 80239b98 7f151000 00000001 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r5:8514f78c r4:8514f400 r10:00000000 r9:84931700 r8:80287e08 r7:eab3de60 r6:84b3d180 r5:84bc6c00 Call trace: dd20: 84a6c000 dfafb000 00000001 80239b98 7f151000 00000001 r4:dff9ddc0 r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:4161 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:4161 tgid:4161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab49d84 r8:00000002 r7:60000113 r6:eab49d8c r5:85188c00 r4:85188c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85188c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85037e00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85188c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e490d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515038c r4:85150000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515038c r4:84931780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85188c00 r8:849317ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931780 r8:80287e08 r7:eab41e60 r6:84b3d200 r5:85188c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85037800 INFO: task kworker/1:443:4161 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 84d32000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:85189800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85037940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85189800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e085f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514fb8c r4:8514f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514fb8c r4:84931800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85189800 r8:8493182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931800 r8:80287e08 r7:eab49e60 r6:84b3d280 r5:85189800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850378c0 INFO: task kworker/1:444:4162 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 84d32000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514ff8c r4:8514fc00 r10:61c88647 r9:8501ec00 r8:849318ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 Workqueue: events bpf_prog_free_deferred r5:8501c800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501c800 r8:84b3d32c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 85530000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4168 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaf1d84 r8:00000002 r7:60000013 r6:eaaf1d8c r5:8518a400 r4:8518a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c0040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8518a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e493b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515078c r4:85150400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515078c r4:84931a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518a400 r8:84931a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931a00 r8:80287e08 r7:eab49e60 r6:84b3d380 r5:8518a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85037a40 INFO: task kworker/1:446:4168 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 85530000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:82:4172 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:82 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab51d84 r8:00000002 r7:60000013 r6:eab51d8c r5:8518b000 r4:8518b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493a9c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518b000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff23000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a8b8c r4:850a8800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a8b8c r4:84b3d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518b000 r8:84b3d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3d400 r8:80287e08 r7:eaaede60 r6:84b3d480 r5:8518b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493a000 INFO: task kworker/0:82:4172 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 85a45000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:4173 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4173 tgid:4173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa15d84 r8:00000002 r7:60000013 r6:eaa15d8c r5:8518bc00 r4:8518bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c02c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8518bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb47000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85150f8c r4:85150c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85150f8c r4:84931a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518bc00 r8:84931aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931a80 r8:80287e08 r7:eaaf1e60 r6:84b3d500 r5:8518bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa15fb0 to 0xeaa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c0100 INFO: task kworker/1:447:4173 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 85a45000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:4174 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:4174 tgid:4174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa9dd84 r8:00000002 r7:60000113 r6:eaa9dd8c r5:8518c800 r4:8518c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c0200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8518c800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85150b8c r4:85150800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85150b8c r4:84931b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518c800 r8:84931b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931b00 r8:80287e08 r7:eaa15e60 r6:84b3d580 r5:8518c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa9dfb0 to 0xeaa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c01c0 INFO: task kworker/1:448:4174 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 85e67000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:4177 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:4177 tgid:4177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab65d84 r8:00000002 r7:60000113 r6:eab65d8c r5:8518e000 r4:8518e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c0440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8518e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbaf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515138c r4:85151000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515138c r4:84931b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518e000 r8:84931bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931b80 r8:80287e08 r7:eaa15e60 r6:84b3d600 r5:8518e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c0300 INFO: task kworker/1:449:4177 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 861ed000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:4179 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab69d84 r8:00000002 r7:60000113 r6:eab69d8c r5:8518ec00 r4:8518ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c0600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8518ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc35000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515178c r4:85151400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515178c r4:84931c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518ec00 r8:84931c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931c00 r8:80287e08 r7:eab65e60 r6:84b3d680 r5:8518ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c04c0 INFO: task kworker/1:450:4179 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 861ed000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:4180 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab6dd84 r8:00000002 r7:60000113 r6:eab6dd8c r5:8518d400 r4:8518d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c06c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8518d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85151b8c r4:85151800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85151b8c r4:84931c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518d400 r8:84931cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931c80 r8:80287e08 r7:eab69e60 r6:84b3d700 r5:8518d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c05c0 INFO: task kworker/1:451:4180 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 86580000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4182 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab71d84 r8:00000002 r7:60000013 r6:eab71d8c r5:85188000 r4:85188000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85188000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c0cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85188000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515278c r4:85152400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515278c r4:84931d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85188000 r8:84931d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931d00 r8:80287e08 r7:eab6de60 r6:84b3d780 r5:85188000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c0700 INFO: task kworker/1:452:4182 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 86580000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:4184 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab75d84 r8:00000002 r7:60000013 r6:eab75d8c r5:84b28000 r4:84b28000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b28000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c08c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b28000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85151f8c r4:85151c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85151f8c r4:84931d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b28000 r8:84931dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931d80 r8:80287e08 r7:eab71e60 r6:84b3d800 r5:84b28000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c0700 INFO: task kworker/1:453:4184 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 86862000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:4186 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab79d84 r8:00000002 r7:60000013 r6:eab79d8c r5:84b28c00 r4:84b28c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b28c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c09c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe93000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515238c r4:85152000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515238c r4:84931e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b28c00 r8:84931e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931e00 r8:80287e08 r7:eab71e60 r6:84b3d880 r5:84b28c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c0940 INFO: task kworker/1:454:4186 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 86ba5000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:4191 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:4191 tgid:4191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab59d84 r8:00000002 r7:60000113 r6:eab59d8c r5:84b29800 r4:84b29800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b29800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493ad80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a938c r4:850a9000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a938c r4:84b3d900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b29800 r8:84b3d92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3d900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3d900 r8:80287e08 r7:eaaede60 r6:84b3d980 r5:84b29800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493aa40 INFO: task kworker/0:83:4191 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 86ba5000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:4192 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:84b2a400 r4:84b2a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493ae40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0503000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a978c r4:850a9400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a978c r4:84b3da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2a400 r8:84b3da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3da00 r8:80287e08 r7:eab59e60 r6:84b3da80 r5:84b2a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493aa40 INFO: task kworker/0:84:4192 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 86ba5000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:4194 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4194 tgid:4194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab85d84 r8:00000002 r7:60000113 r6:eab85d8c r5:84b2b000 r4:84b2b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c0ec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0101000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85152b8c r4:85152800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85152b8c r4:84931e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2b000 r8:84931eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931e80 r8:80287e08 r7:eab71e60 r6:84b3db00 r5:84b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c0c80 INFO: task kworker/1:455:4194 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 86fba000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:4196 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:4196 tgid:4196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab81d84 r8:00000002 r7:60000013 r6:eab81d8c r5:84b2bc00 r4:84b2bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07af000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515378c r4:85153400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515378c r4:84931f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2bc00 r8:84931f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931f00 r8:80287e08 r7:eab85e60 r6:84b3db80 r5:84b2bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab81fb0 to 0xeab81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c0d80 INFO: task kworker/1:456:4196 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 86fba000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:4198 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:85020000 r4:85020000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85020000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850363c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85152f8c r4:85152c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85152f8c r4:84931f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020000 r8:84931fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84931f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84931f80 r8:80287e08 r7:eab81e60 r6:8492c000 r5:85020000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab8dfb0 to 0xeab8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848c0e80 INFO: task kworker/1:457:4198 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 87411000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:4200 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:4200 tgid:4200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:85021800 r4:85021800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85021800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85021800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacff000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850aab8c r4:850aa800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850aab8c r4:84b3dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85021800 r8:84b3dc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3dc00 r8:80287e08 r7:eab61e60 r6:8492c080 r5:85021800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab95fb0 to 0xeab95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493ae80 INFO: task kworker/0:85:4200 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 87548000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:4201 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:4201 tgid:4201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:85022400 r4:85022400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85022400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ea0c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85022400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850a9f8c r4:850a9c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850a9f8c r4:84b3dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:84b3dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3dc80 r8:80287e08 r7:eab95e60 r6:8492c100 r5:85022400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493ae80 INFO: task kworker/0:86:4201 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 87548000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4203 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab9dd84 r8:00000002 r7:60000113 r6:eab9dd8c r5:85023c00 r4:85023c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85023c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61080 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85023c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515338c r4:85153000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515338c r4:8492c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85023c00 r8:8492c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492c180 r8:80287e08 r7:eab81e60 r6:8492c200 r5:85023c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85037f00 INFO: task kworker/1:458:4203 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 87c68000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:e07c1000 r5:85153b8c r4:85153800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61180 INFO: task kworker/1:459:4207 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 87c68000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:4208 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:4208 tgid:4208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:85020c00 r4:85020c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85020c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4210 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4210 tgid:4210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba5d84 r8:00000002 r7:60000013 r6:eaba5d8c r5:85024800 r4:85024800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85024800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85024800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4961000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515838c r4:85158000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515838c r4:8492c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85024800 r8:8492c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492c400 r8:80287e08 r7:eab91e60 r6:8492c480 r5:85024800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:4211 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:85025400 r4:85025400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r5:00001000 r4:e8995000 r5:8515878c r4:85158400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8492c500 r8:80287e08 r7:eaba5e60 r6:8492c580 r5:85025400 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 Workqueue: events bpf_prog_free_deferred r4:85026000 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61bc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85026000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89e5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515938c r4:85159000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515938c r4:8492c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85026000 r8:8492c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492c600 r8:80287e08 r7:eab89e60 r6:8492c680 r5:85026000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61740 INFO: task kworker/1:463:4214 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 882f4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:464 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e89bd000 r5:85158b8c r4:85158800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85026c00 r8:8492c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492c700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492c700 r8:80287e08 r7:eabade60 r6:8492c780 r5:85026c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb5fb0 to 0xeabb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61880 INFO: task kworker/1:464:4216 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 882f4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:4217 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:4217 tgid:4217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:85023000 r4:85023000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85023000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61ac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85023000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85158f8c r4:85158c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85158f8c r4:8492c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85023000 r8:8492c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492c800 r8:80287e08 r7:eabade60 r6:8492c880 r5:85023000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61880 INFO: task kworker/1:465:4217 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 88a7d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:4219 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb9d84 r8:00000002 r7:60000113 r6:eabb9d8c r5:84a92400 r4:84a92400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a92400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a92400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa21000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515a38c r4:8515a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515a38c r4:8492c900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:8492c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492c900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492c900 r8:80287e08 r7:eabade60 r6:8492c980 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61d00 INFO: task kworker/1:466:4219 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 88a7d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:4222 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:4222 tgid:4222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc1d84 r8:00000002 r7:60000113 r6:eabc1d8c r5:8501d400 r4:8501d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b61d40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89f3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515978c r4:85159400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515978c r4:8492ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:8492ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492ca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ca00 r8:80287e08 r7:eabb9e60 r6:8492ca80 r5:8501d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61c80 INFO: task kworker/1:467:4222 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 88a7d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:4224 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:4224 tgid:4224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc5d84 r8:00000002 r7:60000013 r6:eabc5d8c r5:85028000 r4:85028000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85028000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84832800 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85028000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89fb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85159b8c r4:85159800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85159b8c r4:8492cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85028000 r8:8492cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492cb00 r8:80287e08 r7:eabb9e60 r6:8492cb80 r5:85028000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b61f00 INFO: task kworker/1:468:4224 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8936f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:4227 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:85028c00 r4:85028c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85028c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493af80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85028c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85159f8c r4:85159c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85159f8c r4:8492cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85028c00 r8:8492cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492cc00 r8:80287e08 r7:eabb9e60 r6:8492cc80 r5:85028c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc9fb0 to 0xeabc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ee080 INFO: task kworker/1:469:4227 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8936f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:4228 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabcdd84 r8:00000002 r7:60000113 r6:eabcdd8c r5:85029800 r4:85029800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85029800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa2d000 r5:8515a78c r4:8515a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515a78c r4:8492cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85029800 r8:8492cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492cd00 r8:80287e08 r7:eabb9e60 r6:8492cd80 r5:85029800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ee080 INFO: task kworker/1:470:4228 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8936f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:4230 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd9d84 r8:00000002 r7:60000113 r6:eabd9d8c r5:84b2e000 r4:84b2e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee3c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa3f000 r5:8515ab8c r4:8515a800 r7:ddde2d80 r6:83018200 r5:8515ab8c r4:8492ce00 r4:8492ce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492ce00 r8:80287e08 r7:eabcde60 r6:84b3dd80 r5:84b2e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ee200 INFO: task kworker/1:471:4230 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8980f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:4231 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:84b2d400 r4:84b2d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eeac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b2d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8516038c r4:85160000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b2d400 r8:8492ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8492ce80 r8:80287e08 r7:eabd9e60 r6:84b3de00 r5:84b2d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ee200 INFO: task kworker/1:472:4231 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8980f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 Exception stack(0xdff9dfb0 to 0xdff9dff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8492cf00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 8980f000 dfafb000 00000001 80239b98 7f151000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:85192400 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee5c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85192400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515b38c r4:8515b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515b38c r4:8492cf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85192400 r8:8492cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8492cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8492cf80 r8:80287e08 r7:eabdde60 r6:84b3df00 r5:85192400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ee4c0 INFO: task kworker/1:474:4235 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 89b1f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4239 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:4239 tgid:4239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabfdd84 r8:00000002 r7:60000113 r6:eabfdd8c r5:85193c00 r4:85193c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85193c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee880 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85193c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515bb8c r4:8515b800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515bb8c r4:8491b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193c00 r8:8491b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b080 r8:80287e08 r7:eabdde60 r6:842ac000 r5:85193c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ee9c0 INFO: task kworker/1:476:4239 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8a2aa000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8491b100 r8:80287e08 r7:eabdde60 r6:842ac080 r5:85190000 Call trace: r4:82ac21e4 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:4243 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:4243 tgid:4243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:85193000 r4:85193000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85193000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9e040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85193000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac37000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516138c r4:85161000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516138c r4:8491b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193000 r8:8491b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b180 r8:80287e08 r7:eabdde60 r6:842ac100 r5:85193000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ee940 INFO: task kworker/1:478:4243 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8a6f8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:4245 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:85194800 r4:85194800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85194800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eec00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85194800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516078c r4:85160400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516078c r4:8491b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85194800 r8:8491b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b200 r8:80287e08 r7:eac0de60 r6:842ac180 r5:85194800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac15fb0 to 0xeac15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850eeb00 INFO: task kworker/1:479:4245 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8a6f8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4247 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac21d84 r8:00000002 r7:60000013 r6:eac21d8c r5:85195400 r4:85195400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85195400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eec40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85195400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac23000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85160b8c r4:85160800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85160b8c r4:8491b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85195400 r8:8491b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b280 r8:80287e08 r7:eac0de60 r6:842ac200 r5:85195400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac21fb0 to 0xeac21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850eec40 INFO: task kworker/1:480:4247 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8a6f8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:4249 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac35d84 r8:00000002 r7:60000113 r6:eac35d8c r5:84960000 r4:84960000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84960000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eef00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84960000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac29000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8491b300 r8:80287e08 r7:eac0de60 r6:842ac280 r5:84960000 INFO: task kworker/1:481:4249 is blocked on a mutex likely owned by task kworker/1:139:3474. Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8a6f8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:4252 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac41d84 r8:00000002 r7:60000113 r6:eac41d8c r5:84960c00 r4:84960c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84960c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8491b380 Exception stack(0xeac41fb0 to 0xeac41ff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84961800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4905e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9e2c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84961800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85161b8c r4:85161800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85161b8c r4:8491b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84961800 r8:8491b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b400 r8:80287e08 r7:eac41e60 r6:842ac380 r5:84961800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4905fb0 to 0xe4905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b9e1c0 INFO: task kworker/1:483:4254 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8b003000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8491b480 r8:80287e08 r7:e4905e60 r6:842ac400 r5:84962400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:484:4255 is blocked on a mutex likely owned by task kworker/1:139:3474. r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4260 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd1d84 r8:00000002 r7:60000113 r6:eabd1d8c r5:84963c00 r4:84963c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84963c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9e600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84963c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516238c r4:85162000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516238c r4:8491b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84963c00 r8:8491b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b500 r8:80287e08 r7:eac49e60 r6:842ac480 r5:84963c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b9e4c0 INFO: task kworker/1:485:4260 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8b003000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4263 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac55d84 r8:00000002 r7:60000113 r6:eac55d8c r5:84963000 r4:84963000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84963000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9e6c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84963000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516278c r4:85162400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516278c r4:8491b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84963000 r8:8491b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b580 r8:80287e08 r7:eabd1e60 r6:842ac500 r5:84963000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b9e4c0 INFO: task kworker/1:486:4263 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8b339000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:4264 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:84966000 r4:84966000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84966000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84966000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fdb8c r4:851fd800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851fdb8c r4:842ac580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84966000 r8:842ac5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:842ac580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842ac580 r8:80287e08 r7:eab95e60 r6:842ac600 r5:84966000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ea4c0 INFO: task kworker/0:87:4264 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8b6a4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:4265 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:84966c00 r4:84966c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84966c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9ea00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84966c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85162f8c r4:85162c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85162f8c r4:8491b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84966c00 r8:8491b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b600 r8:80287e08 r7:eac55e60 r6:842ac680 r5:84966c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:488 state:D stack:0 pid:4266 tgid:4266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:8502b000 r4:8502b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9e8c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8502b000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85162b8c r4:85162800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85162b8c r4:8491b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502b000 r8:8491b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b680 r8:80287e08 r7:eac5de60 r6:8491b700 r5:8502b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b9e9c0 INFO: task kworker/1:488:4266 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8bbf1000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:84839bc0 Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8502bc00 r4:8291a680 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9eac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8502bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e000b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8516338c r4:85163000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516338c r4:8491b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502bc00 r8:8491b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b780 r8:80287e08 r7:eac5de60 r6:8491b800 r5:8502bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b9e4c0 INFO: task kworker/1:489:4269 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8bbf1000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:4270 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8502c800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9ec00 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8502c800 r8:8491b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b880 r8:80287e08 r7:eac51e60 r6:8491b900 r5:8502c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b9e4c0 INFO: task kworker/1:490:4270 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8c052000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:4273 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac65d84 r8:00000002 r7:60000113 r6:eac65d8c r5:8502d400 r4:8502d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83b9edc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8502d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0583000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85163b8c r4:85163800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85163b8c r4:8491b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502d400 r8:8491b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491b980 r8:80287e08 r7:eac2de60 r6:8491ba00 r5:8502d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac65fb0 to 0xeac65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b9ec40 INFO: task kworker/1:491:4273 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8c28e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4275 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac6dd84 r8:00000002 r7:60000013 r6:eac6dd8c r5:8502e000 r4:8502e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eed40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8502e000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05fb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85163f8c r4:85163c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85163f8c r4:8491ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502e000 r8:8491baac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491ba80 r8:80287e08 r7:eac65e60 r6:8491bb00 r5:8502e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac6dfb0 to 0xeac6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83b9ee00 INFO: task kworker/1:492:4275 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8c2f0000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:4277 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac71d84 r8:00000002 r7:60000013 r6:eac71d8c r5:8502ec00 r4:8502ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84943100 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8502ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0615000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f038c r4:851f0000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f038c r4:8491bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502ec00 r8:8491bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491bb80 r8:80287e08 r7:eac6de60 r6:8491bc00 r5:8502ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84943040 INFO: task kworker/1:493:4277 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8c565000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:4279 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:4279 tgid:4279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac75d84 r8:00000002 r7:60000013 r6:eac75d8c r5:8502a400 r4:8502a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8502a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84943680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8502a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f138c r4:851f1000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f138c r4:8491bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8502a400 r8:8491bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491bc80 r8:80287e08 r7:eac71e60 r6:8491bd00 r5:8502a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84943300 INFO: task kworker/1:494:4279 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8c8c6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:4281 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:84b2ec00 r4:84b2ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849431c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0635000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f078c r4:851f0400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f078c r4:8491bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2ec00 r8:8491bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491bd80 r8:80287e08 r7:eac75e60 r6:8491be00 r5:84b2ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84943180 INFO: task kworker/1:495:4281 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8cb8b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:4283 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac7dd84 r8:00000002 r7:60000113 r6:eac7dd8c r5:85178000 r4:85178000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85178000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849433c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85178000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0665000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f0b8c r4:851f0800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f0b8c r4:8491be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85178000 r8:8491beac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8491be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8491be80 r8:80287e08 r7:eac75e60 r6:8491bf00 r5:85178000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84943380 INFO: task kworker/1:496:4283 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8ce3b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:4285 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac81d84 r8:00000002 r7:60000113 r6:eac81d8c r5:85178c00 r4:85178c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85178c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851f0f8c r4:8491bf80 r10:00000000 r9:8491bf80 r8:80287e08 r7:eac75e60 r6:84333000 r5:85178c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac81fb0 to 0xeac81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849434c0 INFO: task kworker/1:497:4285 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8d2c5000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff9dfb0 to 0xdff9dff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:8517a400 r4:8291a680 r4:00000000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84943ac0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8517a400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0797000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f1b8c r4:851f1800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f1b8c r4:84333080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517a400 r8:843330ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84333080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84333080 r8:80287e08 r7:eac75e60 r6:84333100 r5:8517a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849435c0 INFO: task kworker/1:498:4287 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:499 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8517b000 r8:843331ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 8d2c5000 dfafb000 00000001 80239b98 7f151000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84943c00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8517bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f1f8c r4:851f1c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f1f8c r4:84333280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517bc00 r8:843332ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84333280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84333280 r8:80287e08 r7:eac69e60 r6:84333300 r5:8517bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac85fb0 to 0xeac85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84943cc0 INFO: task kworker/1:500:4291 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8d5f8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:4293 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8517c800 r8:843333ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84943b40 INFO: task kworker/1:501:4293 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8d807000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84943c40 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8517d400 r8:843334ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 8da9d000 dfafb000 00000001 80239b98 7f151000 00000001 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8517e000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84333580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8da9d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:4299 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:4299 tgid:4299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac9dd84 r8:00000002 r7:60000013 r6:eac9dd8c r5:8517ec00 r4:8517ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8517ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849211c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8517ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0825000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f2f8c r4:851f2c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f2f8c r4:84333680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517ec00 r8:843336ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84333680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84333680 r8:80287e08 r7:eac99e60 r6:84333700 r5:8517ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred r5:85179800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85179800 r8:843337ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8df7f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:4302 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:4302 tgid:4302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:85170c00 r4:85170c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85170c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84921540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85170c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e086b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f378c r4:851f3400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84333880 r8:80287e08 r7:eaca1e60 r6:84333900 r5:85170c00 INFO: task kworker/1:506:4302 is blocked on a mutex likely owned by task kworker/1:139:3474. dd20: 8e2ca000 dfafb000 00000001 80239b98 7f151000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85172400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85172400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84921940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85172400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4923000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851f3f8c r4:851f3c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f3f8c r4:84333980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85172400 r8:843339ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84333980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84333980 r8:80287e08 r7:eac8de60 r6:84333a00 r5:85172400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84921500 INFO: task kworker/1:507:4305 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8e376000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84333a80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:4308 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacb1d84 r8:00000002 r7:60000113 r6:eacb1d8c r5:85173c00 r4:85173c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85173c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84921b40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e494b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fc38c r4:851fc000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fc38c r4:84333b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85173c00 r8:84333bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84333b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84333b80 r8:80287e08 r7:eaca9e60 r6:84333c00 r5:85173c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84921d40 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84333c80 r8:80287e08 r7:eacb1e60 r6:84333d00 r5:85174800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:4313 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:85171800 r4:85171800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85171800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84921e00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85171800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fcb8c r4:851fc800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fcb8c r4:84333d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85171800 r8:84333dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84333d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84333d80 r8:80287e08 r7:eacb5e60 r6:84333e00 r5:85171800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84921d00 INFO: task kworker/1:511:4313 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:512:4315 blocked for more than 459 seconds. [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:84964800 r4:84964800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84964800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84964800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fd38c r4:851fd000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fd38c r4:84333f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84964800 r8:84333f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84333f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84333f00 r8:80287e08 r7:eacc1e60 r6:842ac780 r5:84964800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84921f80 INFO: task kworker/1:513:4317 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8f0fe000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:4319 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacd9d84 r8:00000002 r7:60000013 r6:eacd9d8c r5:85196c00 r4:85196c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85196c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522a140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85196c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fd78c r4:851fd400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fd78c r4:84333f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84333f80 Exception stack(0xeacd9fb0 to 0xeacd9ff8) Workqueue: events bpf_prog_free_deferred dd20: 8f44b000 dfafb000 00000001 80239b98 7f151000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:515:4320 blocked for more than 459 seconds. r4:84ab0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r5:00001000 r4:eaceb000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ab0c00 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850aa38c r4:850aa000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850aa38c r4:842ac980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab0c00 r8:842ac9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:842ac980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842ac980 r8:80287e08 r7:eab95e60 r6:842aca00 r5:84ab0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8522f480 INFO: task kworker/0:88:4323 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8f774000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:4325 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84ab1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 r5:851fe38c r4:851fe000 r10:61c88647 r9:84ab1800 r8:8523022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:4327 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:4327 tgid:4327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacf5d84 r8:00000002 r7:60000113 r6:eacf5d8c r5:84ab2400 r4:84ab2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850aa78c r4:850aa400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850aa78c r4:842aca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab2400 r8:842acaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:842aca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842aca80 r8:80287e08 r7:eab95e60 r6:842acb00 r5:84ab2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8522f480 INFO: task kworker/0:89:4327 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8fb6d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:851fef8c r4:851fec00 r7:ddde2d80 r6:83018200 r5:851fef8c r4:85230280 r10:00000000 r9:85230280 r8:80287e08 r7:eacd1e60 r6:842acb80 r5:84ab3000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8fb6d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:84ab3c00 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850abb8c r4:850ab800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ab3c00 r8:842acc2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r5:84553b8c r4:84553800 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ab4800 r8:842acd2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 8ff2c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:4334 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:4334 tgid:4334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:84ab5400 r4:84ab5400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab5400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fe80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab5400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfead000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ab78c r4:850ab400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ab78c r4:842ace00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab5400 r8:842ace2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:842ace00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842ace00 r8:80287e08 r7:eacfde60 r6:842ace80 r5:84ab5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8522f840 INFO: task kworker/0:92:4334 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9057a000 dfafb000 00000001 80239b98 7f151000 00000001 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522aa80 r5:00001000 r4:df9d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851fe78c r4:851fe400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fe78c r4:85230300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab6000 r8:8523032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230300 r8:80287e08 r7:eacbde60 r6:842acf00 r5:84ab6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8522a7c0 INFO: task kworker/1:518:4335 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 905eb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:4338 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:4338 tgid:4338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:85176c00 r4:85176c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85176c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522ab00 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851feb8c r4:851fe800 r10:61c88647 r9:85176c00 r8:852303ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85176000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84830280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85176000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4959000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ffb8c r4:851ff800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ffb8c r4:85230480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85176000 r8:852304ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230480 r8:80287e08 r7:eacbde60 r6:85230500 r5:85176000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8522acc0 INFO: task kworker/1:520:4341 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 90cdb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:4342 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:4342 tgid:4342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead21d84 r8:00000002 r7:60000113 r6:ead21d8c r5:85170000 r4:85170000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85170000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e0525000 r5:851ff38c r4:851ff000 r7:ddde2d80 r6:83018200 r5:851ff38c r4:85230580 Exception stack(0xead21fb0 to 0xead21ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r4:dff9ddc0 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:93:4345 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:93 state:D stack:0 pid:4345 tgid:4345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead2dd84 r8:00000002 r7:60000113 r6:ead2dd8c r5:84965400 r4:84965400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84965400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead2de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:844a7b8c r4:844a7800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84965400 r8:842acfac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:84a60c00 r4:00000000 r4:00000000 r5:850abf8c r4:850abc00 r7:dddced80 r6:83018000 r5:850abf8c r4:8522b080 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:84553b8c r4:84553800 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:95:4350 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:4350 tgid:4350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead31d84 r8:00000002 r7:60000113 r6:ead31d8c r5:84a61800 r4:84a61800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a61800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a61800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844a778c r4:844a7400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844a778c r4:8522b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a61800 r8:8522b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522b180 r8:80287e08 r7:ead2de60 r6:8522b200 r5:84a61800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e6380 INFO: task kworker/0:95:4350 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9197c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:84553b8c r4:84553800 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:96:4351 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:96 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead25d84 r8:00000002 r7:60000013 r6:ead25d8c r5:84a62400 r4:84a62400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a62400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a62400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c4b8c r4:851c4800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c4b8c r4:8522b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a62400 r8:8522b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522b280 r8:80287e08 r7:ead2de60 r6:8522b300 r5:84a62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e6380 INFO: task kworker/0:96:4351 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 91b3f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a63000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:851c438c r4:8522b380 r10:00000000 r9:8522b380 r8:80287e08 r7:ead25e60 r6:8522b400 r5:84a63000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 91c93000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:4355 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4355 tgid:4355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead41d84 r8:00000002 r7:60000013 r6:ead41d8c r5:84a63c00 r4:84a63c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a63c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84830000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ff78c r4:851ff400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:4358 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:4358 tgid:4358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead45d84 r8:00000002 r7:60000013 r6:ead45d8c r5:84a64800 r4:84a64800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a64800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a64800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844b7f8c r4:844b7c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844b7f8c r4:85230700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a64800 r8:8523072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230700 r8:80287e08 r7:eac11e60 r6:8522b500 r5:84a64800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84830180 INFO: task kworker/1:523:4358 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 920db000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851fff8c r4:851ffc00 r10:61c88647 r9:84a65400 r8:852307ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xead49fb0 to 0xead49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84830100 INFO: task kworker/1:524:4359 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9238f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:4361 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a66000 r4:8291a680 r4:00000000 r4:00000000 r5:8520438c r4:85204000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a66000 r8:852308ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84553b8c r4:84553800 r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:526:4363 blocked for more than 460 seconds. r4:84a60000 r4:00000000 r4:00000000 r5:00001000 r4:e89e3000 r5:8520478c r4:85204400 r10:61c88647 r9:84a60000 r8:8523082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85230800 r8:80287e08 r7:ead4de60 r6:8522b680 r5:84a60000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead55fb0 to 0xead55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84830300 INFO: task kworker/1:526:4363 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 927cc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:4366 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:4366 tgid:4366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead61d84 r8:00000002 r7:60000013 r6:ead61d8c r5:851a8000 r4:851a8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85204b8c r4:85204800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 92a0a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:851a8c00 r4:8291a680 r4:00000000 r4:00000000 r5:8520578c r4:85205400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85230980 5fa0: 00000000 00000000 00000000 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/0:98:4369 blocked for more than 460 seconds. r4:851a9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r9:83018005 r8:851a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 r5:851c478c r4:851c4400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c478c r4:8522b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a9800 r8:8522b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522b800 r8:80287e08 r7:ead25e60 r6:8522b880 r5:851a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e6d80 INFO: task kworker/0:98:4369 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 92e08000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:4371 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:4371 tgid:4371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:851aa400 r4:851aa400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851aa400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84830980 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa23000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85204f8c r4:85204c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85204f8c r4:85230a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851aa400 r8:85230a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230a00 r8:80287e08 r7:ead65e60 r6:8522b900 r5:851aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead69fb0 to 0xead69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848308c0 INFO: task kworker/1:529:4371 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9314f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead6dd84 r8:00000002 r7:60000013 r6:ead6dd8c r5:851ab000 r4:851ab000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ab000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84830a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa37000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520538c r4:85205000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8520538c r4:85230a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ab000 r8:85230aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230a80 r8:80287e08 r7:ead65e60 r6:8522b980 r5:851ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead6dfb0 to 0xead6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84830940 INFO: task kworker/1:530:4373 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 93605000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:4375 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead71d84 r8:00000002 r7:60000113 r6:ead71d8c r5:851abc00 r4:851abc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851abc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b1340 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabff000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520638c r4:85206000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8520638c r4:85230b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851abc00 r8:85230b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230b00 r8:80287e08 r7:ead65e60 r6:8522ba00 r5:851abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84830b80 INFO: task kworker/1:531:4375 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9397f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:4377 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead51d84 r8:00000002 r7:60000113 r6:ead51d8c r5:8526a400 r4:8526a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ea400 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8526a400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab7b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85205b8c r4:85205800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85205b8c r4:85230b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526a400 r8:85230bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230b80 r8:80287e08 r7:ead71e60 r6:85230c00 r5:8526a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84830b80 INFO: task kworker/1:532:4377 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 93a95000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:99:4380 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:99 state:D stack:0 pid:4380 tgid:4380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead79d84 r8:00000002 r7:60000113 r6:ead79d8c r5:85269800 r4:85269800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85269800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85269800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c4f8c r4:851c4c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c4f8c r4:8522ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85269800 r8:8522baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522ba80 r8:80287e08 r7:ead25e60 r6:85230c80 r5:85269800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e41c0 INFO: task kworker/0:99:4380 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 93a95000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:100:4382 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:100 state:D stack:0 pid:4382 tgid:4382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:8526bc00 r4:8526bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e42c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c538c r4:851c5000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c538c r4:8522bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526bc00 r8:8522bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522bb00 r8:80287e08 r7:ead79e60 r6:85230d00 r5:8526bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead81fb0 to 0xead81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e4100 INFO: task kworker/0:100:4382 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 93e3f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:4384 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4384 tgid:4384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead85d84 r8:00000002 r7:60000113 r6:ead85d8c r5:85268000 r4:85268000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85268000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b1280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85268000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85205f8c r4:85205c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85205f8c r4:85230d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85268000 r8:85230dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230d80 r8:80287e08 r7:ead71e60 r6:85230e00 r5:85268000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead85fb0 to 0xead85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84830f00 INFO: task kworker/1:533:4384 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 93e3f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:101:4385 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:101 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:8526d400 r4:8526d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c5f8c r4:851c5c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c5f8c r4:8522bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526d400 r8:8522bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522bb80 r8:80287e08 r7:ead81e60 r6:85230e80 r5:8526d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e4200 INFO: task kworker/0:101:4385 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 94308000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:102:4387 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:102 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead91d84 r8:00000002 r7:60000113 r6:ead91d8c r5:8526b000 r4:8526b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead91e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c578c r4:851c5400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c578c r4:8522bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526b000 r8:8522bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522bc00 r8:80287e08 r7:ead8de60 r6:85230f00 r5:8526b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead91fb0 to 0xead91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e4200 INFO: task kworker/0:102:4387 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 94308000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:103:4390 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:103 state:D stack:0 pid:4390 tgid:4390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead5dd84 r8:00000002 r7:60000113 r6:ead5dd8c r5:8526e000 r4:8526e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac09000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c5b8c r4:851c5800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c5b8c r4:8522bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526e000 r8:8522bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522bc80 r8:80287e08 r7:ead8de60 r6:85230f80 r5:8526e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead5dfb0 to 0xead5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e4580 INFO: task kworker/0:103:4390 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9489c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:4391 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead95d84 r8:00000002 r7:60000013 r6:ead95d8c r5:8526c800 r4:8526c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b1e00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8526c800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa25000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85206b8c r4:85206800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85206b8c r4:85230080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526c800 r8:852300ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230080 r8:80287e08 r7:ead71e60 r6:85230100 r5:8526c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b1380 INFO: task kworker/1:534:4391 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9489c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:4393 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead99d84 r8:00000002 r7:60000013 r6:ead99d8c r5:85268c00 r4:85268c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85268c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85268c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac31000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c638c r4:851c6000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851c638c r4:85230180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85268c00 r8:852301ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85230180 r8:80287e08 r7:ead95e60 r6:8503f000 r5:85268c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead99fb0 to 0xead99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b1380 INFO: task kworker/1:535:4393 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 94c16000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:104:4395 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:104 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eada5d84 r8:00000002 r7:60000113 r6:eada5d8c r5:85175400 r4:85175400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85175400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85175400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c6f8c r4:851c6c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c6f8c r4:8522bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85175400 r8:8522bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522bd00 r8:80287e08 r7:ead8de60 r6:8503f080 r5:85175400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e46c0 INFO: task kworker/0:104:4395 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 94ed1000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:105:4396 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:105 state:D stack:0 pid:4396 tgid:4396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead89d84 r8:00000002 r7:60000113 r6:ead89d8c r5:851ac800 r4:851ac800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ac800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead89e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac43000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c678c r4:851c6400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c678c r4:8522bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ac800 r8:8522bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522bd80 r8:80287e08 r7:eada5e60 r6:8522be00 r5:851ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead89fb0 to 0xead89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e46c0 INFO: task kworker/0:105:4396 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9534a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:4399 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead75d84 r8:00000002 r7:60000013 r6:ead75d8c r5:851ae000 r4:851ae000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ae000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4b80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c6b8c r4:851c6800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851c6b8c r4:8503f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ae000 r8:8503f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f100 r8:80287e08 r7:ead95e60 r6:8522be80 r5:851ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead75fb0 to 0xead75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b1880 INFO: task kworker/1:536:4399 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9534a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:106:4402 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:106 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eada1d84 r8:00000002 r7:60000113 r6:eada1d8c r5:851aec00 r4:851aec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851aec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849df7c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07df000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c7b8c r4:851c7800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c7b8c r4:8522bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851aec00 r8:8522bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8522bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522bf00 r8:80287e08 r7:eada5e60 r6:8522bf80 r5:851aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada1fb0 to 0xeada1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e4e00 INFO: task kworker/0:106:4402 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9534a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:107:4404 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:107 state:D stack:0 pid:4404 tgid:4404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eada9d84 r8:00000002 r7:60000113 r6:eada9d8c r5:851ad400 r4:851ad400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ad400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84832a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c778c r4:851c7400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c778c r4:850c0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ad400 r8:850c002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0000 r8:80287e08 r7:eada1e60 r6:850c0080 r5:851ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e4e00 INFO: task kworker/0:107:4404 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 95c5d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:4405 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadbdd84 r8:00000002 r7:60000013 r6:eadbdd8c r5:84ab6c00 r4:84ab6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b1c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ab6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520678c r4:85206400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8520678c r4:8503f180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab6c00 r8:8503f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f180 r8:80287e08 r7:ead95e60 r6:850c0100 r5:84ab6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b1700 INFO: task kworker/1:537:4405 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 95c5d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:4408 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4408 tgid:4408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb9d84 r8:00000002 r7:60000013 r6:eadb9d8c r5:851b8000 r4:851b8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b1f40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd69000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85206f8c r4:85206c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85206f8c r4:8503f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b8000 r8:8503f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f200 r8:80287e08 r7:ead95e60 r6:850c0180 r5:851b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b1dc0 INFO: task kworker/1:538:4408 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 96134000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:108:4411 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:108 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:851b8c00 r4:851b8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dfb40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac61000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d438c r4:851d4000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d438c r4:850c0200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b8c00 r8:850c022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0200 r8:80287e08 r7:eada1e60 r6:850c0280 r5:851b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84832d00 INFO: task kworker/0:108:4411 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 96134000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:4413 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd1d84 r8:00000002 r7:60000013 r6:eadd1d8c r5:851b9800 r4:851b9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851b9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b1a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe05000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520738c r4:85207000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8520738c r4:8503f280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851b9800 r8:8503f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f280 r8:80287e08 r7:eadb9e60 r6:850c0300 r5:851b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b1fc0 INFO: task kworker/1:539:4413 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 96134000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:4415 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd5d84 r8:00000002 r7:60000013 r6:eadd5d8c r5:851ba400 r4:851ba400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851ba400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520778c r4:85207400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8520778c r4:8503f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851ba400 r8:8503f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f300 r8:80287e08 r7:eadd1e60 r6:850c0380 r5:851ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b1ec0 INFO: task kworker/1:540:4415 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 968e6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:4417 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:4417 tgid:4417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd9d84 r8:00000002 r7:60000013 r6:eadd9d8c r5:851bb000 r4:851bb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01bd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85207b8c r4:85207800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85207b8c r4:8503f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bb000 r8:8503f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f380 r8:80287e08 r7:eadd5e60 r6:850c0400 r5:851bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433b100 INFO: task kworker/1:541:4417 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 968e6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:4419 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadddd84 r8:00000002 r7:60000113 r6:eadddd8c r5:851bbc00 r4:851bbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b3c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0585000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85207f8c r4:85207c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85207f8c r4:8503f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bbc00 r8:8503f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f400 r8:80287e08 r7:eadd9e60 r6:850c0480 r5:851bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433b080 INFO: task kworker/1:542:4419 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 96dac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:4420 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade1d84 r8:00000002 r7:60000013 r6:eade1d8c r5:851bc800 r4:851bc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0647000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521078c r4:85210400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521078c r4:8503f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bc800 r8:8503f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f480 r8:80287e08 r7:eaddde60 r6:850c0500 r5:851bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade1fb0 to 0xeade1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433b080 INFO: task kworker/1:543:4420 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 96dac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:4424 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:4424 tgid:4424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:851bd400 r4:851bd400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bd400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521038c r4:85210000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521038c r4:8503f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bd400 r8:8503f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f500 r8:80287e08 r7:eade1e60 r6:850c0580 r5:851bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433b080 INFO: task kworker/1:544:4424 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 96dac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:4425 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadf5d84 r8:00000002 r7:60000113 r6:eadf5d8c r5:851be000 r4:851be000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851be000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851be000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0719000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85210f8c r4:85210c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85210f8c r4:8503f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851be000 r8:8503f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f600 r8:80287e08 r7:eade1e60 r6:850c0600 r5:851be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf5fb0 to 0xeadf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433b540 INFO: task kworker/1:545:4425 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 96dac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:4426 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadcdd84 r8:00000002 r7:60000013 r6:eadcdd8c r5:8526ec00 r4:8526ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8526ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85210b8c r4:85210800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85210b8c r4:8503f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526ec00 r8:8503f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f580 r8:80287e08 r7:eadf5e60 r6:8503f680 r5:8526ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433b540 INFO: task kworker/1:546:4426 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 97672000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:4429 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadedd84 r8:00000002 r7:60000013 r6:eadedd8c r5:84a66c00 r4:84a66c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a66c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadede08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b9c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521138c r4:85211000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521138c r4:8503f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a66c00 r8:8503f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f700 r8:80287e08 r7:eadf5e60 r6:8503f780 r5:84a66c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadedfb0 to 0xeadedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433b780 INFO: task kworker/1:547:4429 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 97672000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:4430 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:4430 tgid:4430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade5d84 r8:00000002 r7:60000013 r6:eade5d8c r5:85270000 r4:85270000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85270000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433bcc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85270000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521178c r4:85211400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521178c r4:8503f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85270000 r8:8503f82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f800 r8:80287e08 r7:eadede60 r6:8503f880 r5:85270000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade5fb0 to 0xeade5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433bb00 INFO: task kworker/1:548:4430 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 97b34000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:109:4433 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:109 state:D stack:0 pid:4433 tgid:4433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae05d84 r8:00000002 r7:60000113 r6:eae05d8c r5:85272400 r4:85272400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85272400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849df880 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85272400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e081b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c7f8c r4:851c7c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c7f8c r4:850c0680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85272400 r8:850c06ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0680 r8:80287e08 r7:eadc9e60 r6:8503f900 r5:85272400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae05fb0 to 0xeae05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849df780 INFO: task kworker/0:109:4433 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 97ff2000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:4435 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae09d84 r8:00000002 r7:60000113 r6:eae09d8c r5:85273000 r4:85273000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85273000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ef040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85273000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e087f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85211f8c r4:85211c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85211f8c r4:8503f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85273000 r8:8503f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503f980 r8:80287e08 r7:eade5e60 r6:8503fa00 r5:85273000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae09fb0 to 0xeae09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8433bc80 INFO: task kworker/1:549:4435 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 97ff2000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4438 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae0dd84 r8:00000002 r7:60000113 r6:eae0dd8c r5:85271800 r4:85271800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85271800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b1740 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85271800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0839000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85211b8c r4:85211800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85211b8c r4:8503fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85271800 r8:8503faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503fa80 r8:80287e08 r7:eae09e60 r6:8503fb00 r5:85271800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b1040 INFO: task kworker/1:550:4438 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9811f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:110:4439 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:110 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae01d84 r8:00000002 r7:60000113 r6:eae01d8c r5:85273c00 r4:85273c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85273c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849df9c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85273c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844a4f8c r4:844a4c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:844a4f8c r4:850c0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85273c00 r8:850c072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0700 r8:80287e08 r7:eadc9e60 r6:8503fb80 r5:85273c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae01fb0 to 0xeae01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849df8c0 INFO: task kworker/0:110:4439 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9811f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:4441 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae1dd84 r8:00000002 r7:60000013 r6:eae1dd8c r5:85270c00 r4:85270c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85270c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ef3c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85270c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4919000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521238c r4:85212000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521238c r4:8503fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85270c00 r8:8503fc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503fc00 r8:80287e08 r7:eae09e60 r6:8503fc80 r5:85270c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ef1c0 INFO: task kworker/1:551:4441 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 984b0000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:4443 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae21d84 r8:00000002 r7:60000013 r6:eae21d8c r5:85274800 r4:85274800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85274800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ef580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85274800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e494d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521278c r4:85212400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521278c r4:8503fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85274800 r8:8503fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503fd00 r8:80287e08 r7:eae1de60 r6:8503fd80 r5:85274800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae21fb0 to 0xeae21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ef140 INFO: task kworker/1:552:4443 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9898a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:553:4445 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:553 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae25d84 r8:00000002 r7:60000013 r6:eae25d8c r5:85276c00 r4:85276c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85276c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ef880 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85276c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85212b8c r4:85212800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85212b8c r4:8503fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85276c00 r8:8503fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503fe00 r8:80287e08 r7:eae21e60 r6:8503fe80 r5:85276c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ef540 INFO: task kworker/1:553:4445 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9898a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:4448 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae2dd84 r8:00000002 r7:60000013 r6:eae2dd8c r5:85279800 r4:85279800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85279800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850efa40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85279800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85212f8c r4:85212c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85212f8c r4:8503ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85279800 r8:8503ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503ff00 r8:80287e08 r7:eae25e60 r6:8503ff80 r5:85279800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ef840 INFO: task kworker/1:554:4448 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 98db4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4450 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:4450 tgid:4450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae11d84 r8:00000002 r7:60000113 r6:eae11d8c r5:85278c00 r4:85278c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85278c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85278c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521378c r4:85213400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521378c r4:8503c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85278c00 r8:8503c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c000 r8:80287e08 r7:eae2de60 r6:8503c080 r5:85278c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ef180 INFO: task kworker/1:555:4450 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 99125000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:111:4452 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:111 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae35d84 r8:00000002 r7:60000113 r6:eae35d8c r5:8527b000 r4:8527b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe15000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d5b8c r4:851d5800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d5b8c r4:850c0780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527b000 r8:850c07ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0780 r8:80287e08 r7:eadc9e60 r6:8503c100 r5:8527b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae35fb0 to 0xeae35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849dfac0 INFO: task kworker/0:111:4452 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 99471000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:4453 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:8527bc00 r4:8527bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b16c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8527bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521338c r4:85213000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521338c r4:8503c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527bc00 r8:8503c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c180 r8:80287e08 r7:eae11e60 r6:8503c200 r5:8527bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae39fb0 to 0xeae39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850efd40 INFO: task kworker/1:556:4453 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 99471000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:112:4454 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:112 state:D stack:0 pid:4454 tgid:4454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:8527c800 r4:8527c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dfcc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d478c r4:851d4400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d478c r4:850c0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527c800 r8:850c082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0800 r8:80287e08 r7:eae35e60 r6:8503c280 r5:8527c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae3dfb0 to 0xeae3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849dfac0 INFO: task kworker/0:112:4454 is blocked on a mutex likely owned by task kworker/1:139:3474. r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 task:kworker/0:113 state:D stack:0 pid:4456 tgid:4456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae45d84 r8:00000002 r7:60000113 r6:eae45d8c r5:8527d400 r4:8527d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dfd80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d4b8c r4:851d4800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d4b8c r4:850c0880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527d400 r8:850c08ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0880 r8:80287e08 r7:eae35e60 r6:8503c300 r5:8527d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae45fb0 to 0xeae45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849dfc00 INFO: task kworker/0:113:4456 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 99915000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:114:4457 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:114 state:D stack:0 pid:4457 tgid:4457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae4dd84 r8:00000002 r7:60000113 r6:eae4dd8c r5:8527e000 r4:8527e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c89c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf03000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d4f8c r4:851d4c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d4f8c r4:850c0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527e000 r8:850c092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0900 r8:80287e08 r7:eae35e60 r6:850c0980 r5:8527e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849dfdc0 INFO: task kworker/0:114:4457 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 99c91000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4461 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:84350000 r4:84350000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84350000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7180 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84350000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead03000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85213b8c r4:85213800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85213b8c r4:8503c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84350000 r8:8503c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c380 r8:80287e08 r7:eae11e60 r6:850c0a00 r5:84350000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae51fb0 to 0xeae51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7000 INFO: task kworker/1:557:4461 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9a1f1000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4464 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4464 tgid:4464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae5dd84 r8:00000002 r7:60000013 r6:eae5dd8c r5:84351800 r4:84351800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84351800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84351800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85213f8c r4:85213c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85213f8c r4:8503c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84351800 r8:8503c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c400 r8:80287e08 r7:eae51e60 r6:850c0a80 r5:84351800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae5dfb0 to 0xeae5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7140 INFO: task kworker/1:558:4464 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9a1f1000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:4465 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae61d84 r8:00000002 r7:60000013 r6:eae61d8c r5:84353c00 r4:84353c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84353c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84353c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae63000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521838c r4:85218000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521838c r4:8503c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84353c00 r8:8503c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c480 r8:80287e08 r7:eae5de60 r6:850c0b00 r5:84353c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae61fb0 to 0xeae61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7140 INFO: task kworker/1:559:4465 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9a69c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4467 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae71d84 r8:00000002 r7:60000113 r6:eae71d8c r5:84352400 r4:84352400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84352400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84352400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae83000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85218b8c r4:85218800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85218b8c r4:8503c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84352400 r8:8503c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c500 r8:80287e08 r7:eae61e60 r6:850c0b80 r5:84352400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae71fb0 to 0xeae71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7380 INFO: task kworker/1:560:4467 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9a69c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4468 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4468 tgid:4468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:84355400 r4:84355400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84355400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84355400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae69000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521878c r4:85218400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521878c r4:8503c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84355400 r8:8503c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c580 r8:80287e08 r7:eae71e60 r6:850c0c00 r5:84355400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7680 INFO: task kworker/1:561:4468 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9a979000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:4470 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae81d84 r8:00000002 r7:60000113 r6:eae81d8c r5:84354800 r4:84354800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84354800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7a00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84354800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521978c r4:85219400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521978c r4:8503c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84354800 r8:8503c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c600 r8:80287e08 r7:eae71e60 r6:850c0c80 r5:84354800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7140 INFO: task kworker/1:562:4470 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9ac66000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:4472 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae95d84 r8:00000002 r7:60000013 r6:eae95d8c r5:84356c00 r4:84356c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84356c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84356c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85218f8c r4:85218c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85218f8c r4:8503c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84356c00 r8:8503c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c680 r8:80287e08 r7:eae81e60 r6:850c0d00 r5:84356c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b75c0 INFO: task kworker/1:563:4472 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9ae1d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:4475 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:4475 tgid:4475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:85278000 r4:85278000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85278000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85278000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521938c r4:85219000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521938c r4:8503c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85278000 r8:8503c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c700 r8:80287e08 r7:eae81e60 r6:8503c780 r5:85278000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae49fb0 to 0xeae49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7780 INFO: task kworker/1:564:4475 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9b231000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:4477 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:4477 tgid:4477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae9dd84 r8:00000002 r7:60000113 r6:eae9dd8c r5:8527ec00 r4:8527ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ef0c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8527ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521a78c r4:8521a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521a78c r4:8503c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527ec00 r8:8503c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c800 r8:80287e08 r7:eae81e60 r6:8503c880 r5:8527ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae9dfb0 to 0xeae9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7a40 INFO: task kworker/1:565:4477 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9b231000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:4478 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:8527a400 r4:8527a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7c00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8527a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85219b8c r4:85219800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85219b8c r4:8503c900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527a400 r8:8503c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503c900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503c900 r8:80287e08 r7:eae9de60 r6:8503c980 r5:8527a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7d40 INFO: task kworker/1:566:4478 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9b537000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:4481 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaebdd84 r8:00000002 r7:60000013 r6:eaebdd8c r5:85275400 r4:85275400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85275400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b7d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85275400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85219f8c r4:85219c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85219f8c r4:8503ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85275400 r8:8503ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503ca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503ca00 r8:80287e08 r7:eae9de60 r6:8503ca80 r5:85275400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaebdfb0 to 0xeaebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b7cc0 INFO: task kworker/1:567:4481 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9b993000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:4483 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaecdd84 r8:00000002 r7:60000013 r6:eaecdd8c r5:85280c00 r4:85280c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85280c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849df280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85280c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521a38c r4:8521a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521a38c r4:8503cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85280c00 r8:8503cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503cb00 r8:80287e08 r7:eae9de60 r6:8503cb80 r5:85280c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaecdfb0 to 0xeaecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849df5c0 INFO: task kworker/1:568:4483 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9b993000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:4485 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:85282400 r4:85282400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85282400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84345040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85282400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521ab8c r4:8521a800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521ab8c r4:8503cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85282400 r8:8503cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503cc00 r8:80287e08 r7:eae9de60 r6:8503cc80 r5:85282400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ef7c0 INFO: task kworker/1:569:4485 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9ba34000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4487 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:85281800 r4:85281800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85281800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843454c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85281800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeef000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521b38c r4:8521b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521b38c r4:8503cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85281800 r8:8503cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503cd00 r8:80287e08 r7:eaed5e60 r6:8503cd80 r5:85281800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84345140 INFO: task kworker/1:570:4487 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9be4e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:571:4489 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:571 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeedd84 r8:00000002 r7:60000013 r6:eaeedd8c r5:85283c00 r4:85283c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85283c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843452c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85283c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521af8c r4:8521ac00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521af8c r4:8503ce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85283c00 r8:8503ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503ce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503ce00 r8:80287e08 r7:eaee5e60 r6:8503ce80 r5:85283c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeedfb0 to 0xeaeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84345280 INFO: task kworker/1:571:4489 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9c075000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:572:4491 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:572 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef9d84 r8:00000002 r7:60000113 r6:eaef9d8c r5:85283000 r4:85283000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85283000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84345a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85283000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf09000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521bb8c r4:8521b800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521bb8c r4:8503cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85283000 r8:8503cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8503cf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503cf00 r8:80287e08 r7:eaee5e60 r6:8503cf80 r5:85283000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843450c0 INFO: task kworker/1:572:4491 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9c224000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:4492 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:4492 tgid:4492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeb1d84 r8:00000002 r7:60000113 r6:eaeb1d8c r5:85284800 r4:85284800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85284800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843456c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85284800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521b78c r4:8521b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521b78c r4:84332000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85284800 r8:8433202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332000 r8:80287e08 r7:eaef9e60 r6:84332080 r5:85284800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84345800 INFO: task kworker/1:573:4492 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9c3bf000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:115:4495 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:115 state:D stack:0 pid:4495 tgid:4495 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf11d84 r8:00000002 r7:60000113 r6:eaf11d8c r5:85286000 r4:85286000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85286000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8f40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85286000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d578c r4:851d5400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d578c r4:850c0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85286000 r8:850c0dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0d80 r8:80287e08 r7:eae35e60 r6:84332100 r5:85286000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c8980 INFO: task kworker/0:115:4495 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9c52f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:4497 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:4497 tgid:4497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf19d84 r8:00000002 r7:60000013 r6:eaf19d8c r5:85286c00 r4:85286c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85286c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84345c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85286c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521bf8c r4:8521bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8521bf8c r4:84332180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85286c00 r8:843321ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332180 r8:80287e08 r7:eaef9e60 r6:84332200 r5:85286c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf19fb0 to 0xeaf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84345a00 INFO: task kworker/1:574:4497 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9c7d9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:4499 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf29d84 r8:00000002 r7:60000113 r6:eaf29d8c r5:85285400 r4:85285400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85285400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84345dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85285400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf21000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522438c r4:85224000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522438c r4:84332280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85285400 r8:843322ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332280 r8:80287e08 r7:eaf19e60 r6:84332300 r5:85285400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843458c0 INFO: task kworker/1:575:4499 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9cc52000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:4501 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:576 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf0dd84 r8:00000002 r7:60000113 r6:eaf0dd8c r5:85276000 r4:85276000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85276000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85276000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf31000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85224b8c r4:85224800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85224b8c r4:84332380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85276000 r8:843323ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332380 r8:80287e08 r7:eaf29e60 r6:84332400 r5:85276000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84345d00 INFO: task kworker/1:576:4501 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9ce52000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:4503 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:4503 tgid:4503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:85288000 r4:85288000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85288000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850efbc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85288000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522478c r4:85224400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522478c r4:84332480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85288000 r8:843324ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332480 r8:80287e08 r7:eaf0de60 r6:84332500 r5:85288000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf01fb0 to 0xeaf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84345e80 INFO: task kworker/1:577:4503 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9ceaf000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:4505 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:85288c00 r4:85288c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85288c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85224f8c r4:85224c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85224f8c r4:84332580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85288c00 r8:843325ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332580 r8:80287e08 r7:eaf0de60 r6:84332600 r5:85288c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf35fb0 to 0xeaf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af3280 INFO: task kworker/1:578:4505 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9d151000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:4507 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:4507 tgid:4507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf49d84 r8:00000002 r7:60000113 r6:eaf49d8c r5:8528a400 r4:8528a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf49e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8528a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf45000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522538c r4:85225000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522538c r4:84332680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528a400 r8:843326ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332680 r8:80287e08 r7:eaf35e60 r6:84332700 r5:8528a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af3100 INFO: task kworker/1:579:4507 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9d3a9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:4509 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf55d84 r8:00000002 r7:60000013 r6:eaf55d8c r5:8528b000 r4:8528b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af35c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8528b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf57000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522578c r4:85225400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522578c r4:84332780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528b000 r8:843327ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332780 r8:80287e08 r7:eaf49e60 r6:84332800 r5:8528b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af32c0 INFO: task kworker/1:580:4509 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9d65e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:4510 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:4510 tgid:4510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf61d84 r8:00000002 r7:60000013 r6:eaf61d8c r5:84353000 r4:84353000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84353000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84353000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522638c r4:85226000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522638c r4:84332880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84353000 r8:843328ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332880 r8:80287e08 r7:eaf55e60 r6:850c0e00 r5:84353000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf61fb0 to 0xeaf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af3580 INFO: task kworker/1:581:4510 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9d88b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eaf69d84 r8:00000002 r7:60000013 r6:eaf69d8c r5:8528c800 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3bc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8528c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00dd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85225b8c r4:85225800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85225b8c r4:84332900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528c800 r8:8433292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332900 r8:80287e08 r7:eaf61e60 r6:84332980 r5:8528c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af3740 INFO: task kworker/1:582:4513 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9db39000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:116:4518 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:116 state:D stack:0 pid:4518 tgid:4518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:84350c00 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84350c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r5:851d5f8c r4:851d5c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d5f8c r4:850c0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84350c00 r8:850c0eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0e80 r8:80287e08 r7:eae35e60 r6:850c0f00 r5:84350c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf3dfb0 to 0xeaf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c8300 INFO: task kworker/0:116:4518 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9ddff000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:117:4519 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:117 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf79d84 r8:00000002 r7:60000113 r6:eaf79d8c r5:84356000 r4:84356000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84356000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850c8780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84356000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d638c r4:851d6000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d638c r4:850c0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84356000 r8:850c0fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850c0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850c0f80 r8:80287e08 r7:eaf3de60 r6:851eb000 r5:84356000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c8500 INFO: task kworker/0:117:4519 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9dfd2000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:118:4520 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:118 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf65d84 r8:00000002 r7:60000013 r6:eaf65d8c r5:85280000 r4:85280000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85280000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85248c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85280000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff81000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d738c r4:851d7000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d738c r4:851eb080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85280000 r8:851eb0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851eb080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eb080 r8:80287e08 r7:eaf79e60 r6:851eb100 r5:85280000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf65fb0 to 0xeaf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c8500 INFO: task kworker/0:118:4520 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9e054000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:119:4522 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:119 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf81d84 r8:00000002 r7:60000113 r6:eaf81d8c r5:851bec00 r4:851bec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851bec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf81e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ea9c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead59000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d678c r4:851d6400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d678c r4:851eb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851bec00 r8:851eb1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851eb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eb180 r8:80287e08 r7:eaf65e60 r6:851eb200 r5:851bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf81fb0 to 0xeaf81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850c8500 INFO: task kworker/0:119:4522 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9e369000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:4523 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf85d84 r8:00000002 r7:60000013 r6:eaf85d8c r5:848e8000 r4:848e8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf85e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85225f8c r4:85225c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85225f8c r4:84332a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e8000 r8:84332a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332a00 r8:80287e08 r7:eaf61e60 r6:851eb280 r5:848e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf85fb0 to 0xeaf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af3d00 INFO: task kworker/1:583:4523 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9e53c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:584:4526 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:848e8c00 r4:848e8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3a40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89ad000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85226b8c r4:85226800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85226b8c r4:84332a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e8c00 r8:84332aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332a80 r8:80287e08 r7:eaf61e60 r6:851eb300 r5:848e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af3d00 INFO: task kworker/1:584:4526 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9e7fc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:4527 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf8dd84 r8:00000002 r7:60000113 r6:eaf8dd8c r5:848e9800 r4:848e9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3f80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4953000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522678c r4:85226400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522678c r4:84332b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e9800 r8:84332b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332b00 r8:80287e08 r7:eaf89e60 r6:851eb380 r5:848e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af3d40 INFO: task kworker/1:585:4527 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9eb22000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:4529 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf95d84 r8:00000002 r7:60000013 r6:eaf95d8c r5:848eb000 r4:848eb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848eb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8433b0c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89d5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85226f8c r4:85226c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85226f8c r4:84332b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848eb000 r8:84332bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332b80 r8:80287e08 r7:eaf89e60 r6:851eb400 r5:848eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af38c0 INFO: task kworker/1:586:4529 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9ee43000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:4532 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:848ebc00 r4:848ebc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ebc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89f9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522738c r4:85227000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522738c r4:84332c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ebc00 r8:84332c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332c00 r8:80287e08 r7:eaf95e60 r6:851eb480 r5:848ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa1fb0 to 0xeafa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820000 INFO: task kworker/1:587:4532 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9f041000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:4534 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa9d84 r8:00000002 r7:60000113 r6:eafa9d8c r5:848ed400 r4:848ed400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ed400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85227f8c r4:85227c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85227f8c r4:84332c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ed400 r8:84332cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332c80 r8:80287e08 r7:eafa1e60 r6:851eb500 r5:848ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820000 INFO: task kworker/1:588:4534 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9f2e7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:4535 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:4535 tgid:4535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafadd84 r8:00000002 r7:60000113 r6:eafadd8c r5:848ea400 r4:848ea400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ea400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848201c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa19000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522778c r4:85227400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522778c r4:84332d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ea400 r8:84332dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332d80 r8:80287e08 r7:eafa9e60 r6:851eb580 r5:848ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848202c0 INFO: task kworker/1:589:4535 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9f5ad000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:4537 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:4537 tgid:4537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:848ec800 r4:848ec800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ec800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820380 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa41000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85227b8c r4:85227800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85227b8c r4:84332d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ec800 r8:84332d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332d00 r8:80287e08 r7:eafa9e60 r6:851eb600 r5:848ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820180 INFO: task kworker/1:590:4537 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9f5e5000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:4539 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafbdd84 r8:00000002 r7:60000013 r6:eafbdd8c r5:848ee000 r4:848ee000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ee000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848205c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa81000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d838c r4:852d8000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d838c r4:84332e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ee000 r8:84332e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332e00 r8:80287e08 r7:eafa9e60 r6:851eb680 r5:848ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820340 INFO: task kworker/1:591:4539 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9f5e5000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:4541 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:85289800 r4:85289800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85289800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820780 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85289800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d878c r4:852d8400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d878c r4:84332f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85289800 r8:84332f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332f00 r8:80287e08 r7:eafbde60 r6:84332e80 r5:85289800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820480 INFO: task kworker/1:592:4541 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9f988000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:4543 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:593 state:D stack:0 pid:4543 tgid:4543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:8528d400 r4:8528d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8528d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d8b8c r4:852d8800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d8b8c r4:84332f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528d400 r8:84332fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84332f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84332f80 r8:80287e08 r7:eaf7de60 r6:85234000 r5:8528d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820540 INFO: task kworker/1:593:4543 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9fd81000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:4545 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:4545 tgid:4545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:849b8000 r4:849b8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac01000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d938c r4:852d9000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d938c r4:85234080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b8000 r8:852340ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234080 r8:80287e08 r7:eafc1e60 r6:851eb700 r5:849b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820740 INFO: task kworker/1:594:4545 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: 9fdc9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:4547 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:4547 tgid:4547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:849b9800 r4:849b9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820a00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabef000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d8f8c r4:852d8c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d8f8c r4:85234100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b9800 r8:8523412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234100 r8:80287e08 r7:eafc9e60 r6:851eb780 r5:849b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848208c0 INFO: task kworker/1:595:4547 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a00d6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:4550 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:849bbc00 r4:849bbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf73000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852db38c r4:852db000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852db38c r4:85234180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bbc00 r8:852341ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234180 r8:80287e08 r7:eafc9e60 r6:851eb800 r5:849bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd9fb0 to 0xeafd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820bc0 INFO: task kworker/1:596:4550 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a028a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:4551 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafddd84 r8:00000002 r7:60000013 r6:eafddd8c r5:849ba400 r4:849ba400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ba400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d978c r4:852d9400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d978c r4:85234200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ba400 r8:8523422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234200 r8:80287e08 r7:eafd9e60 r6:851eb880 r5:849ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820bc0 INFO: task kworker/1:597:4551 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a0554000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:4553 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:849bd400 r4:849bd400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bd400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac39000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d9b8c r4:852d9800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d9b8c r4:85234280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bd400 r8:852342ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234280 r8:80287e08 r7:eafd9e60 r6:851eb900 r5:849bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe5fb0 to 0xeafe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820cc0 INFO: task kworker/1:598:4553 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a078b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:4555 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:849bc800 r4:849bc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af3680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead19000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d9f8c r4:852d9c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d9f8c r4:85234300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bc800 r8:8523432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234300 r8:80287e08 r7:eafd9e60 r6:851eb980 r5:849bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820e00 INFO: task kworker/1:599:4555 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a0d15000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:600:4557 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:600 state:D stack:0 pid:4557 tgid:4557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff5d84 r8:00000002 r7:60000113 r6:eaff5d8c r5:849bb000 r4:849bb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead33000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852da38c r4:852da000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852da38c r4:85234380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bb000 r8:852343ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234380 r8:80287e08 r7:eafd9e60 r6:851eba00 r5:849bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523f000 INFO: task kworker/1:600:4557 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a0d15000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:4560 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafc5d84 r8:00000002 r7:60000013 r6:eafc5d8c r5:849bec00 r4:849bec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849bec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852da78c r4:852da400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852da78c r4:85234480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bec00 r8:852344ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234480 r8:80287e08 r7:eafd9e60 r6:851eba80 r5:849bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc5fb0 to 0xeafc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523f380 INFO: task kworker/1:601:4560 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a0dc4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:4562 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:8528e000 r4:8528e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8528e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadaf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852dab8c r4:852da800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852dab8c r4:85234400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528e000 r8:8523442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234400 r8:80287e08 r7:eafd9e60 r6:85234500 r5:8528e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523f4c0 INFO: task kworker/1:602:4562 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a0f76000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:120:4564 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:120 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff9d84 r8:00000002 r7:60000013 r6:eaff9d8c r5:8528bc00 r4:8528bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85248b80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8528bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd15000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d6f8c r4:851d6c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d6f8c r4:851ebb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528bc00 r8:851ebb2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r4:dff9ddc0 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r4:8483ac80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eadc1000 r7:ddde2d80 r6:83018200 r5:852daf8c r4:85234600 r10:00000000 r9:85234600 r8:80287e08 r7:eafd9e60 r6:85234680 r5:8528ec00 r4:8523f300 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:604:4567 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:604 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:85290000 r4:85290000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85290000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852db78c r4:852db400 r10:61c88647 r9:85290000 r8:8523472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: a1783000 dfafb000 00000001 80239b98 7f151000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:84553b8c r4:84553800 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85290c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523f940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85290c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb019000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852dbb8c r4:852db800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852dbb8c r4:85234800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85290c00 r8:8523482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234800 r8:80287e08 r7:eb005e60 r6:85234880 r5:85290c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523fb00 INFO: task kworker/1:605:4571 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a1783000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:4572 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:4572 tgid:4572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:85291800 r4:85291800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85291800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523fb80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85291800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r5:852dbf8c r4:852dbc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85291800 r8:8523492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:607:4575 blocked for more than 462 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:85292400 r4:85292400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85292400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523fc40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85292400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852dc38c r4:852dc000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852dc38c r4:85234a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85292400 r8:85234a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234a00 r8:80287e08 r7:eb01de60 r6:85234a80 r5:85292400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523fb40 INFO: task kworker/1:607:4575 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a1e1d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:82ac21e4 r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852dd78c r4:852dd400 r10:61c88647 r9:85293000 r8:85234b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:4577 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:85293c00 r4:85293c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85293c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523ff00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85293c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852dc78c r4:852dc400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852dc78c r4:85234c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85293c00 r8:85234c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234c00 r8:80287e08 r7:eb031e60 r6:85234c80 r5:85293c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb00dfb0 to 0xeb00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8523fc80 INFO: task kworker/1:609:4577 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a2342000 dfafb000 00000001 80239b98 7f151000 00000001 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:84553b8c r4:84553800 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84820f40 r5:852dcb8c r4:852dc800 r10:61c88647 r9:85295400 r8:85234d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234d00 r8:80287e08 r7:eb031e60 r6:85234d80 r5:85295400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84820f00 INFO: task kworker/1:610:4579 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a2342000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:4581 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:4581 tgid:4581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb069d84 r8:00000002 r7:60000013 r6:eb069d8c r5:85296000 r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:852dcf8c r4:85234e00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r4:00000000 r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:612:4584 blocked for more than 462 seconds. r10:8291a684 r9:eb075d84 r8:00000002 r7:60000013 r6:eb075d8c r5:85296c00 r4:85296c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85296c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852541c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85296c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852dd38c r4:852dd000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852dd38c r4:85234f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85296c00 r8:85234f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85234f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85234f00 r8:80287e08 r7:eb031e60 r6:85234f80 r5:85296c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85254180 INFO: task kworker/1:612:4584 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a29ee000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85294800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 r7:ddde2d80 r6:83018200 r5:852ddb8c r4:85259000 r10:00000000 r9:85259000 r8:80287e08 r7:eb031e60 r6:85259080 r5:85294800 r4:852542c0 Workqueue: events bpf_prog_free_deferred dd20: a2a5d000 dfafb000 00000001 80239b98 7f151000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:4588 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:4588 tgid:4588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:85310000 r4:85310000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85310000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85254600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85310000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ad000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ddf8c r4:852ddc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ddf8c r4:85259100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85310000 r8:8525912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85259100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85259100 r8:80287e08 r7:eb095e60 r6:85259180 r5:85310000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a9fb0 to 0xeb0a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852543c0 INFO: task kworker/1:614:4588 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a2e1d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eae59d84 r8:00000002 r7:60000113 r6:eae59d8c r5:85312400 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:851d778c r4:851d7400 r7:dddced80 r6:83018000 r5:851d778c r4:851ebb80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:122:4596 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:122 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae55d84 r8:00000002 r7:60000013 r6:eae55d8c r5:849b8c00 r4:849b8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85248ec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d7b8c r4:851d7800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d7b8c r4:851ebc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b8c00 r8:851ebc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851ebc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ebc00 r8:80287e08 r7:eae59e60 r6:851ebc80 r5:849b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85248d80 INFO: task kworker/0:122:4596 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a3260000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849be000 r4:8291a680 r4:00000000 r4:00000000 r5:00001000 r4:e06c5000 r5:84af478c r4:84af4400 r10:61c88647 r9:849be000 r8:851ebd2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb0b1fb0 to 0xeb0b1ff8) Workqueue: events bpf_prog_free_deferred [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:4599 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c1d84 r8:00000002 r7:60000113 r6:eb0c1d8c r5:848eec00 r4:848eec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848eec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852546c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa53000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852de38c r4:852de000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852de38c r4:85259280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848eec00 r8:852592ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85259280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85259280 r8:80287e08 r7:eb0a9e60 r6:851ebe00 r5:848eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852547c0 INFO: task kworker/1:615:4599 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a351d000 dfafb000 00000001 80239b98 7f151000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9400 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaefb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852def8c r4:852dec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852def8c r4:85259300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b8000 r8:8525932c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85259300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85259300 r8:80287e08 r7:eb0c1e60 r6:851ebe80 r5:852b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852547c0 INFO: task kworker/1:616:4600 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a38b6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0633000 r5:851d7f8c r4:851d7c00 r4:851ebf00 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:125:4604 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:125 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0bdd84 r8:00000002 r7:60000013 r6:eb0bdd8c r5:852b9800 r4:852b9800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852b9800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0743000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af438c r4:84af4000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af438c r4:8525b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852b9800 r8:8525b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525b000 r8:80287e08 r7:eb0b1e60 r6:8525b080 r5:852b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85255080 INFO: task kworker/0:125:4604 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a3aac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:126:4605 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:126 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d9d84 r8:00000002 r7:60000013 r6:eb0d9d8c r5:852bb000 r4:852bb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852bb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255400 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0805000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dc78c r4:850dc400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dc78c r4:8525b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8525b100 r8:80287e08 r7:eb0bde60 r6:8525b180 r5:852bb000 r4:85255080 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 Not tainted 6.15.0-rc6-syzkaller #0 r4:85311800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r9:83018005 r8:85311800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r7:dddced80 r6:83018000 r5:850dc38c r4:8525b200 r4:00000001 r4:85255080 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:128:4611 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:128 state:D stack:0 pid:4611 tgid:4611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0edd84 r8:00000002 r7:60000113 r6:eb0edd8c r5:85310c00 r4:85310c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85310c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852554c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85310c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0847000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dcb8c r4:850dc800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dcb8c r4:8525b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85310c00 r8:8525b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525b280 r8:80287e08 r7:eb0d9e60 r6:85259400 r5:85310c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdff9dfb0 to 0xdff9dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85315400 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85315400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:850dcf8c r4:850dcc00 r10:61c88647 r9:85315400 r8:8525b32c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a4567000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:130:4613 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:130 state:D stack:0 pid:4613 tgid:4613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f5d84 r8:00000002 r7:60000013 r6:eb0f5d8c r5:85316000 r4:85316000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85316000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85316000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:850dd78c r4:850dd400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:131:4616 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:131 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:85314800 r4:85314800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85314800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852557c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85314800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dd38c r4:850dd000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dd38c r4:8525b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85314800 r8:8525b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525b400 r8:80287e08 r7:eb0f5e60 r6:85259580 r5:85314800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85255a00 INFO: task kworker/0:131:4616 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a4832000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85313c00 r4:8291a680 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:850de78c r4:850de400 r7:dddced80 r6:83018000 r5:850de78c r4:8525b480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:dff9ddc0 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:133:4619 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:133 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:85316c00 r4:85316c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85316c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85255a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85316c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ddb8c r4:850dd800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ddb8c r4:8525b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85316c00 r8:8525b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525b500 r8:80287e08 r7:eb109e60 r6:85259680 r5:85316c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852559c0 INFO: task kworker/0:133:4619 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a4f9c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852559c0 r5:850ddf8c r4:850ddc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a4f9c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:4623 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:85298000 r5:85298000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850de38c r4:850de000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85298000 r8:8525b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85255e00 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:00000000 r5:00001000 r4:dfb17000 r5:84553b8c r4:84553800 r4:8483ac80 r4:00000001 r4:84839bc0 task:kworker/0:136 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85299800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85254f00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85299800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850def8c r4:850dec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850def8c r4:8525b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85299800 r8:8525b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525b680 r8:80287e08 r7:eb109e60 r6:85259800 r5:85299800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85255f00 INFO: task kworker/0:136:4625 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:617 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eae91000 r5:85348f8c r4:85348c00 r7:ddde2d80 r6:83018200 r5:85348f8c r4:85259880 r10:61c88647 r9:8529b000 r8:852598ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85247840 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:137 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:850deb8c r4:850de800 r10:61c88647 r9:8529bc00 r8:8525b72c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:138:4630 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:138 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb135d84 r8:00000002 r7:60000113 r6:eb135d8c r5:8529d400 r4:8529d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529d400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae75000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534878c r4:85348400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534878c r4:8525b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529d400 r8:8525b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525b780 r8:80287e08 r7:eb125e60 r6:85259a00 r5:8529d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85254e40 INFO: task kworker/0:138:4630 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a5d64000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:4633 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb141d84 r8:00000002 r7:60000013 r6:eb141d8c r5:8529c800 r4:8529c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529c800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r9:83018005 r8:8529c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:850df38c r4:850df000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8529e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ea300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529e000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae19000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850df78c r4:850df400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850df78c r4:8525b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529e000 r8:8525b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525b880 r8:80287e08 r7:eb135e60 r6:85259b00 r5:8529e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb149fb0 to 0xeb149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85254e40 INFO: task kworker/0:140:4635 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a60a4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Not tainted 6.15.0-rc6-syzkaller #0 r4:8529ec00 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8529ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:850dfb8c r4:850df800 r10:61c88647 r9:8529ec00 r8:8525b92c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb14dfb0 to 0xeb14dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a60a4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:4638 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:4638 tgid:4638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:8529a400 r4:8529a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae41000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850dff8c r4:850dfc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dff8c r4:8525b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529a400 r8:8525b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525b980 r8:80287e08 r7:eb135e60 r6:85259c00 r5:8529a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85235180 INFO: task kworker/0:142:4638 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a64a4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 r4:82ac21e4 r4:dff9ddc0 r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:4641 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb161d84 r8:00000002 r7:60000013 r6:eb161d8c r5:85319800 r4:85319800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85319800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85319800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534838c r4:85348000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534838c r4:8525ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85319800 r8:8525ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ba00 r8:80287e08 r7:eb135e60 r6:85259c80 r5:85319800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae85000 r5:85348b8c r4:85348800 r10:61c88647 r9:852bc800 r8:8525baac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:4645 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:852bd400 r4:852bd400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852bd400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaead000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534938c r4:85349000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534938c r4:8525bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852bd400 r8:8525bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525bb80 r8:80287e08 r7:eb121e60 r6:8525bc00 r5:852bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85235500 INFO: task kworker/0:145:4645 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r5:852de78c r4:852de400 r10:61c88647 r9:852be000 r8:8525bcac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:618:4649 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:618 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb171d84 r8:00000002 r7:60000113 r6:eb171d8c r5:852ba400 r4:852ba400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ba400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb171e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852deb8c r4:852de800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852deb8c r4:85259d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ba400 r8:85259d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85259d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85259d00 r8:80287e08 r7:eaea9e60 r6:8525bd80 r5:852ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb171fb0 to 0xeb171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85247000 INFO: task kworker/1:618:4649 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a6ff5000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 r5:84553b8c r4:84553800 r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8531a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r9:83018005 r8:8531a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r7:dddced80 r6:83018000 r5:85349f8c r4:8525be00 r4:8525be00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:4652 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb175d84 r8:00000002 r7:60000013 r6:eb175d8c r5:85318000 r4:85318000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85318000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85235d40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85318000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534978c r4:85349400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534978c r4:8525be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85318000 r8:8525beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525be80 r8:80287e08 r7:eb169e60 r6:85259e00 r5:85318000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaedd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85349b8c r4:85349800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85349b8c r4:8525bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531c800 r8:8525bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525bf00 r8:80287e08 r7:eb169e60 r6:85259e80 r5:8531c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85235dc0 INFO: task kworker/0:149:4656 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a749a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8531b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 r5:8534ab8c r4:8534a800 r10:61c88647 r9:8531b000 r8:8525bfac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:4659 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb17dd84 r8:00000002 r7:60000113 r6:eb17dd8c r5:852bbc00 r4:852bbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852bbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231040 r5:8534a38c r4:8534a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852bbc00 r8:8523202c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdff9dfb0 to 0xdff9dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8531d400 r4:8291a680 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dfb6f000 r5:852dfb8c r4:852df800 r10:61c88647 r9:8531d400 r8:85259fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e93c0 INFO: task kworker/1:619:4661 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a7c20000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:4663 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb18dd84 r8:00000002 r7:60000113 r6:eb18dd8c r5:8531ec00 r4:8531ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 r5:852df38c r4:852df000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8531ec00 r8:850b00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb18dfb0 to 0xeb18dff8) r4:851e95c0 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 INFO: task kworker/0:152:4664 blocked for more than 464 seconds. r10:8291a684 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8531bc00 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534a78c r4:8534a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85318c00 r4:8291a680 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231380 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85318c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf37000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534af8c r4:8534ac00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534af8c r4:85232180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85318c00 r8:852321ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85232180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232180 r8:80287e08 r7:eb185e60 r6:850b0200 r5:85318c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852313c0 INFO: task kworker/0:153:4668 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a8396000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84980c00 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8534b38c r4:8534b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb1add84 r8:00000002 r7:60000113 r6:eb1add8c r5:84981800 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852315c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84981800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf59000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534b78c r4:8534b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534b78c r4:85232280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84981800 r8:852322ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85232280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232280 r8:80287e08 r7:eb1a9e60 r6:850b0300 r5:84981800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85231480 INFO: task kworker/0:155:4671 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a87c5000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84982400 r4:8291a680 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8534bb8c r4:8534b800 r7:dddced80 r6:83018000 r5:8534bb8c r4:85232300 r10:00000000 r9:85232300 r8:80287e08 r7:eb1ade60 r6:850b0380 r5:84982400 r4:852316c0 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:00000000 r5:84553b8c r4:84553800 r4:8483ac80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:4674 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:84980000 r4:84980000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84980000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952880 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84980000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535f78c r4:8535f400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535f78c r4:85232380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84980000 r8:852323ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85232380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232380 r8:80287e08 r7:eb1b1e60 r6:850b0400 r5:84980000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85231600 INFO: task kworker/0:157:4674 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a8c54000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84983c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85237600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fff8c r4:852ffc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852fff8c r4:85232400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84983c00 r8:8523242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85232400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85232400 r8:80287e08 r7:eb1b9e60 r6:850b0480 r5:84983c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85231900 INFO: task kworker/0:158:4676 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a8c54000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84984800 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:852dff8c r4:852dfc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84984800 r8:850b052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e94c0 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:622:4682 blocked for more than 464 seconds. r10:8291a684 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:84986000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 r7:ddde2d80 r6:83018200 r5:849e0f8c r4:850b0600 r10:00000000 r9:850b0600 r8:80287e08 r7:eaf6de60 r6:850b0680 r5:84986000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b50c0 INFO: task kworker/1:622:4682 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a918e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:623:4684 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:623 state:D stack:0 pid:4684 tgid:4684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:84986c00 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e00ef000 r5:852fc38c r4:852fc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:850b0700 r8:80287e08 r7:eb1b5e60 r6:850b0780 r5:84986c00 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:4686 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000013 r6:eaf99d8c r5:84985400 r4:84985400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84985400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b5480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84985400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e495f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fcb8c r4:852fc800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fcb8c r4:850b0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84985400 r8:850b082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b0800 r8:80287e08 r7:eb189e60 r6:850b0880 r5:84985400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b5200 INFO: task kworker/1:624:4686 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a982f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84553b8c r4:84553800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:852fc78c r4:852fc400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850b0900 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:626:4690 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1c9d84 r8:00000002 r7:60000013 r6:eb1c9d8c r5:8531e000 r4:8531e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8531e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b5680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8531e000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89cd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fcf8c r4:852fcc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fcf8c r4:850b0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8531e000 r8:850b0a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b0a00 r8:80287e08 r7:eaf99e60 r6:850b0a80 r5:8531e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b54c0 INFO: task kworker/1:626:4690 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85313000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb1cdfb0 to 0xeb1cdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b55c0 INFO: task kworker/1:627:4693 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: a9d69000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:4694 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08 r5:00001000 r4:eaa35000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:852c2400 r8:850b0c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b5ec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fe78c r4:852fe400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fe78c r4:850b0c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c3000 r8:850b0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b0c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b0c80 r8:80287e08 r7:eb1d9e60 r6:85232500 r5:852c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b5900 INFO: task kworker/1:629:4695 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: aa5b0000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84839bc0 Workqueue: events bpf_prog_free_deferred r4:852c3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r5:00001000 r4:eaa71000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850b0d00 r8:80287e08 r7:eb1dde60 r6:85232580 r5:852c3c00 r4:850b5c80 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:8483ac80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:631:4699 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:631 state:D stack:0 pid:4699 tgid:4699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e5d84 r8:00000002 r7:60000013 r6:eb1e5d8c r5:852c4800 r4:852c4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b5cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fdf8c r4:852fdc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fdf8c r4:850b0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c4800 r8:850b0dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b0d80 r8:80287e08 r7:eb1dde60 r6:85232600 r5:852c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 80050013 ffffffff r5:00001000 r4:dfb17000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84839bc0 r10:8291a684 r9:eb1e9d84 r8:00000002 r7:60000113 r6:eb1e9d8c r5:852c5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b5dc0 r7:ddde2d80 r6:83018200 r5:852fe38c r4:850b0e00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: aa5b0000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:4704 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f5d84 r8:00000002 r7:60000113 r6:eb1f5d8c r5:852c6000 r4:852c6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85237040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac45000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852fef8c r4:852fec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fef8c r4:850b0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c6000 r8:850b0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b0e80 r8:80287e08 r7:eb1dde60 r6:85232700 r5:852c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:634:4705 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:634 state:D stack:0 pid:4705 tgid:4705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:852c0c00 r4:852c0c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c0c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e97c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac27000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852feb8c r4:852fe800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852feb8c r4:850b0f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c0c00 r8:850b0f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850b0f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850b0f00 r8:80287e08 r7:eb1f5e60 r6:85232780 r5:852c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b5e00 INFO: task kworker/1:634:4705 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 dd20: ab04c000 dfafb000 00000001 80239b98 7f151000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850b0f80 Exception stack(0xeb205fb0 to 0xeb205ff8) r4:85237000 Call trace: dd20: ab04c000 dfafb000 00000001 80239b98 7f151000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:636:4711 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:636 state:D stack:0 pid:4711 tgid:4711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:85320c00 r4:85320c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85320c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85237380 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85320c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ffb8c r4:852ff800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ffb8c r4:85238000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85320c00 r8:8523802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238000 r8:80287e08 r7:eb205e60 r6:85238080 r5:85320c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d5fb0 to 0xeb1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85237280 INFO: task kworker/1:636:4711 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ab3ec000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85237240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85321800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ff78c r4:852ff400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ff78c r4:85238100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85321800 r8:8523812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238100 r8:80287e08 r7:eb1d5e60 r6:85238180 r5:85321800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85237280 INFO: task kworker/1:637:4713 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ab3ec000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85322400 r8:8523822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb20dfb0 to 0xeb20dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:4715 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:639 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb215d84 r8:00000002 r7:60000113 r6:eb215d8c r5:85323000 r4:85323000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85323000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85237840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85323000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530438c r4:85304000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530438c r4:85238300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85323000 r8:8523832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238300 r8:80287e08 r7:eb20de60 r6:85238380 r5:85323000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85237740 INFO: task kworker/1:639:4715 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ab806000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb211e08 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:4720 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb221d84 r8:00000002 r7:60000113 r6:eb221d8c r5:852c1800 r4:852c1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85237b40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85304b8c r4:85304800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85304b8c r4:85238500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c1800 r8:8523852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb221fb0 to 0xeb221ff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:159 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84840000 r8:8523292c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:4724 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:84841800 r4:84841800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84841800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85231900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84841800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb015000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85305b8c r4:85238580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:00000000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84839bc0 Workqueue: events bpf_prog_free_deferred r5:84842400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85237d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84842400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530538c r4:85305000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530538c r4:85238600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84842400 r8:8523862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238600 r8:80287e08 r7:eb231e60 r6:85232a80 r5:84842400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85237bc0 INFO: task kworker/1:643:4725 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ac5c2000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85237e40 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84840c00 r8:852386ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ac5c2000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:4730 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:84843000 r4:84843000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84843000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8530638c r4:85238700 r10:00000000 r9:85238700 r8:80287e08 r7:eb231e60 r6:85232b80 r5:84843000 r4:85231880 Call trace: dd20: ac9cb000 dfafb000 00000001 80239b98 7f151000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:84553b8c r4:84553800 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:84843c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e040 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84843c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb021000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85305f8c r4:85305c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85305f8c r4:85238780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84843c00 r8:852387ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238780 r8:80287e08 r7:eb249e60 r6:85232c00 r5:84843c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb24dfb0 to 0xeb24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85237e80 INFO: task kworker/1:646:4731 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ac9cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:84844800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e400 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84844800 r8:8523882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r5:80050013 r4:80239bb0 r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:4736 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb261d84 r8:00000002 r7:60000113 r6:eb261d8c r5:84846c00 r4:84846c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84846c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84846c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb04b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530678c r4:85306400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530678c r4:85238880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84846c00 r8:852388ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238880 r8:80287e08 r7:eb259e60 r6:85232d00 r5:84846c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb261fb0 to 0xeb261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525e3c0 INFO: task kworker/1:648:4736 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: acf67000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb0b5000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:84553b8c r4:84553800 r4:8483ac80 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:4739 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb25dd84 r8:00000002 r7:60000013 r6:eb25dd8c r5:85325400 r4:85325400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85325400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525e640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85325400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85306f8c r4:85306c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85306f8c r4:85238980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85325400 r8:852389ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238980 r8:80287e08 r7:eb265e60 r6:85238a00 r5:85325400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525e340 INFO: task kworker/1:650:4739 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ad463000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:dff9ddc0 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85326000 r8:85238aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238a80 r8:80287e08 r7:eb265e60 r6:85238b00 r5:85326000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb269fb0 to 0xeb269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525e340 INFO: task kworker/1:651:4742 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ad463000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:160:4743 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:160 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84845400 r8:85232e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb21dfb0 to 0xeb21dff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred r5:84846000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84846000 r8:85238bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238b80 r8:80287e08 r7:eb269e60 r6:85232f00 r5:84846000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb219fb0 to 0xeb219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525eb40 INFO: task kworker/1:652:4746 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: adc54000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:4747 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:852c0000 r4:852c0000 r5:852c0000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:654:4750 blocked for more than 464 seconds. task:kworker/1:654 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb139d84 r8:00000002 r7:60000013 r6:eb139d8c r5:84b68c00 r4:84b68c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b68c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525ee40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ef000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530878c r4:85308400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530878c r4:85238c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b68c00 r8:85238cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238c80 r8:80287e08 r7:eb269e60 r6:850cd000 r5:84b68c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb139fb0 to 0xeb139ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525e580 INFO: task kworker/1:654:4750 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: adc54000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb195d84 r8:00000002 r7:60000113 r6:eb195d8c r5:84b69800 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb195fb0 to 0xeb195ff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e061d000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b68000 r8:85238dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ae0b9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:4755 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85309f8c r4:85238e00 r10:00000000 r9:85238e00 r8:80287e08 r7:eb279e60 r6:850cd180 r5:84b6b000 r4:850cf080 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r5:84b6bc00 r4:8291a680 r4:00000000 r4:00000000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb199fb0 to 0xeb199ff8) r4:850cf100 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:00000000 r5:84553b8c r4:84553800 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:659:4761 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:659 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:84b6e000 r4:84b6e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6e000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cf340 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0823000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530938c r4:85309000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530938c r4:85238f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6e000 r8:85238f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85238f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85238f00 r8:80287e08 r7:eb27de60 r6:850cd280 r5:84b6e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cf400 INFO: task kworker/1:659:4761 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: aea17000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:dff9ddc0 r5:00001000 r4:dfb17000 r4:8483ac80 r4:00000001 Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:4765 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:661 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb295d84 r8:00000002 r7:60000113 r6:eb295d8c r5:84b6d400 r4:84b6d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cf600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85309b8c r4:85309800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85309b8c r4:850ca000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6d400 r8:850ca02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca000 r8:80287e08 r7:eb27de60 r6:850cd380 r5:84b6d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb295fb0 to 0xeb295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cf580 INFO: task kworker/1:661:4765 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: aea17000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b6a400 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8530a38c r4:850ca080 r10:00000000 r9:850ca080 r8:80287e08 r7:eb27de60 r6:850cd400 r5:84b6a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd20: af00f000 dfafb000 00000001 80239b98 7f151000 00000001 r4:dff9ddc0 r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:663:4768 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:663 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:84b6c800 r4:84b6c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cf9c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaced000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530a78c r4:8530a400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530a78c r4:850ca100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6c800 r8:850ca12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca100 r8:80287e08 r7:eb299e60 r6:850cd480 r5:84b6c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cf900 INFO: task kworker/1:663:4768 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: af22f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cfb40 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850ca180 r8:80287e08 r7:eb29de60 r6:850cd500 r5:853b0000 r4:850cf740 Call trace: dd20: af22f000 dfafb000 00000001 80239b98 7f151000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:850ca200 r8:80287e08 r7:eb2a1e60 r6:850cd580 r5:853b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cfb80 INFO: task kworker/1:665:4773 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: af51a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:4775 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:4775 tgid:4775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a9d84 r8:00000002 r7:60000113 r6:eb2a9d8c r5:853b1800 r4:853b1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cfe40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530b38c r4:8530b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530b38c r4:850ca280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b1800 r8:850ca2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca280 r8:80287e08 r7:eb2a5e60 r6:850cd600 r5:853b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cfe00 INFO: task kworker/1:666:4775 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: af51a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:4777 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2add84 r8:00000002 r7:60000013 r6:eb2add8c r5:853b2400 r4:853b2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525eb80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530b78c r4:8530b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530b78c r4:850ca300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b2400 r8:850ca32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc6-syzkaller #0 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853b3000 r8:850ca3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:4781 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2b5d84 r8:00000002 r7:60000013 r6:eb2b5d8c r5:853b3c00 r4:853b3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85266000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530bf8c r4:8530bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530bf8c r4:850ca400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b3c00 r8:850ca42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca400 r8:80287e08 r7:eb2b1e60 r6:850cd780 r5:853b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cff40 INFO: task kworker/1:669:4781 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: afbea000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdff9dfb0 to 0xdff9dff8) r4:84839bc0 task:kworker/1:670 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r5:00001000 r4:eaed1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530c78c r4:8530c400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530c78c r4:850ca480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85326c00 r8:850ca4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca480 r8:80287e08 r7:eb2b5e60 r6:850ca500 r5:85326c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb271fb0 to 0xeb271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266100 INFO: task kworker/1:670:4783 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: afbea000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:4785 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2b9d84 r8:00000002 r7:60000113 r6:eb2b9d8c r5:85328c00 r4:85328c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85328c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d5d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85328c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeab000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535c78c r4:8535c400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535c78c r4:850cd800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85328c00 r8:850cd82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd800 r8:80287e08 r7:eb1b9e60 r6:850ca580 r5:85328c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:162 state:D stack:0 pid:4786 tgid:4786 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85378cc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535cb8c r4:8535c800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535cb8c r4:850cd880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b4800 r8:850cd8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850cd880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cd880 r8:80287e08 r7:eb1b9e60 r6:850cd900 r5:853b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb285fb0 to 0xeb285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d5dc0 INFO: task kworker/0:162:4786 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b067e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r5:84553b8c r4:84553800 r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:671:4788 blocked for more than 465 seconds. r4:853b5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853b5400 r8:850ca62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b067e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:4791 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:4791 tgid:4791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaef1000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) r4:85266540 Call trace: dd20: b0738000 dfafb000 00000001 80239b98 7f151000 00000001 r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84bd0c00 r8:850ca72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca700 r8:80287e08 r7:eb2c9e60 r6:850cda80 r5:84bd0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266600 INFO: task kworker/1:673:4793 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b0738000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:4795 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000013 r6:eb2d9d8c r5:84bd2400 r4:84bd2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852668c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530d38c r4:8530d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530d38c r4:850ca780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd2400 r8:850ca7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca780 r8:80287e08 r7:eb2d1e60 r6:850cdb00 r5:84bd2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266600 INFO: task kworker/1:674:4795 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b0f0b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:675:4797 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:675 state:D stack:0 pid:4797 tgid:4797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000013 r6:eb2e1d8c r5:84bd3000 r4:84bd3000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd3000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85266c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd3000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b7000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530df8c r4:8530dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530df8c r4:850ca800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd3000 r8:850ca82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca800 r8:80287e08 r7:eb2d9e60 r6:850cdb80 r5:84bd3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266840 INFO: task kworker/1:675:4797 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b0f0b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:4798 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:84bd1800 r4:84bd1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85266980 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd1800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530d78c r4:8530d400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530d78c r4:850ca880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd1800 r8:850ca8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca880 r8:80287e08 r7:eb2e1e60 r6:850cdc00 r5:84bd1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266b40 INFO: task kworker/1:676:4798 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b0f0b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:4800 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2edd84 r8:00000002 r7:60000113 r6:eb2edd8c r5:84bd0000 r4:84bd0000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd0000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85266b80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530db8c r4:8530d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530db8c r4:850ca900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd0000 r8:850ca92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca900 r8:80287e08 r7:eb2e1e60 r6:850cdc80 r5:84bd0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852669c0 INFO: task kworker/1:677:4800 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b1394000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:4803 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:84bd3c00 r4:84bd3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85266e80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530e38c r4:8530e000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530e38c r4:850ca980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd3c00 r8:850ca9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ca980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ca980 r8:80287e08 r7:eb2e1e60 r6:850cdd00 r5:84bd3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266c80 INFO: task kworker/1:678:4803 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b1701000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:4804 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:4804 tgid:4804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f9d84 r8:00000002 r7:60000113 r6:eb2f9d8c r5:84bd5400 r4:84bd5400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd5400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cfa40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd5400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530ef8c r4:8530ec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530ef8c r4:850caa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd5400 r8:850caa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850caa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850caa00 r8:80287e08 r7:eb2f5e60 r6:850cdd80 r5:84bd5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266c80 INFO: task kworker/1:679:4804 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b1701000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:4808 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:4808 tgid:4808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb305d84 r8:00000002 r7:60000113 r6:eb305d8c r5:84bd4800 r4:84bd4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850d51c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd4800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530e78c r4:8530e400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530e78c r4:850caa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd4800 r8:850caaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850caa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850caa80 r8:80287e08 r7:eb2f9e60 r6:850cde00 r5:84bd4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266f00 INFO: task kworker/1:680:4808 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b18dc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:4809 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb309d84 r8:00000002 r7:60000013 r6:eb309d8c r5:853b6c00 r4:853b6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85266fc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb103000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530eb8c r4:8530e800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530eb8c r4:850cab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b6c00 r8:850cab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cab00 r8:80287e08 r7:eb2f9e60 r6:850cde80 r5:853b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85266f00 INFO: task kworker/1:681:4809 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b1d93000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 task:kworker/1:682 state:D stack:0 pid:4810 tgid:4810 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85328000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530f38c r4:8530f000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530f38c r4:850cab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85328000 r8:850cabac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cab80 r8:80287e08 r7:eb2f9e60 r6:850cac00 r5:85328000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cffc0 INFO: task kworker/1:682:4810 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b2125000 dfafb000 00000001 80239b98 7f151000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:4812 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb301d84 r8:00000002 r7:60000113 r6:eb301d8c r5:8532bc00 r4:8532bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8532bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381340 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530f78c r4:8530f400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530f78c r4:850cac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8532bc00 r8:850cacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cac80 r8:80287e08 r7:eb2bde60 r6:850cad00 r5:8532bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb301fb0 to 0xeb301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85381080 INFO: task kworker/1:683:4812 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b2125000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:dff9ddc0 r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred r4:84bd6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381440 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc7f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530fb8c r4:8530f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530fb8c r4:850cad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd6c00 r8:850cadac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cad80 r8:80287e08 r7:eb301e60 r6:850cdf00 r5:84bd6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85381200 INFO: task kworker/1:684:4816 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b246b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:4819 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1fdd84 r8:00000002 r7:60000113 r6:eb1fdd8c r5:853c0c00 r4:853c0c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c0c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0071000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8530ff8c r4:8530fc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530ff8c r4:850cae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c0c00 r8:850cae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cae00 r8:80287e08 r7:eb2c1e60 r6:850cdf80 r5:853c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853813c0 INFO: task kworker/1:685:4819 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b297c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r5:00001000 r4:dfb17000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:686:4820 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb239d84 r8:00000002 r7:60000113 r6:eb239d8c r5:853c1800 r4:853c1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853816c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0769000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ac38c r4:853ac000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853ac38c r4:850cae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c1800 r8:850caeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850cae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850cae80 r8:80287e08 r7:eb1fde60 r6:8538b000 r5:853c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853813c0 INFO: task kworker/1:686:4820 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b297c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:4823 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb311d84 r8:00000002 r7:60000113 r6:eb311d8c r5:853c0000 r4:853c0000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c0000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853817c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8981000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ac78c r4:853ac400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853ac78c r4:850caf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c0000 r8:850caf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850caf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850caf00 r8:80287e08 r7:eb239e60 r6:8538b080 r5:853c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85381600 INFO: task kworker/1:687:4823 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b297c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:688:4824 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:688 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:853c3c00 r4:853c3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381bc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ad38c r4:853ad000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853ad38c r4:850caf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c3c00 r8:850cafac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850caf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850caf80 r8:80287e08 r7:eb311e60 r6:8538b100 r5:853c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85381600 INFO: task kworker/1:688:4824 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b2c7c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:4826 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb31dd84 r8:00000002 r7:60000113 r6:eb31dd8c r5:853c5400 r4:853c5400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c5400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381940 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89ed000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853acb8c r4:853ac800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853acb8c r4:85387000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c5400 r8:8538702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387000 r8:80287e08 r7:eb315e60 r6:8538b180 r5:853c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85381880 INFO: task kworker/1:689:4826 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b30dd000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:8532b000 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853acf8c r4:853acc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853acf8c r4:85387080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8532b000 r8:853870ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387080 r8:80287e08 r7:eb315e60 r6:85387100 r5:8532b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85381b80 INFO: task kworker/1:690:4827 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b3481000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:691:4830 blocked for more than 465 seconds. r5:8532d400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381f40 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:692:4831 blocked for more than 465 seconds. r5:8532e000 r4:8291a680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387280 r8:80287e08 r7:eb319e60 r6:85387300 r5:8532e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85381e80 INFO: task kworker/1:692:4831 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b37fe000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532ec00 r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853adf8c r4:853adc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853adf8c r4:85387380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8532ec00 r8:853873ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387380 r8:80287e08 r7:eb319e60 r6:85387400 r5:8532ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85381c80 INFO: task kworker/1:693:4833 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b3a53000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853ae38c r4:853ae000 r4:85387480 Exception stack(0xeb329fb0 to 0xeb329ff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:4838 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:8532a400 r4:8532a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8532a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8532a400 r8:853875ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:4839 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85387680 r8:80287e08 r7:eb345e60 r6:85387700 r5:85329800 r4:85397180 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:697:4840 blocked for more than 465 seconds. r5:85324800 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85324800 r8:853877ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eb355d84 r8:00000002 r7:60000013 r6:eb355d8c r5:85340000 r5:85340000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397640 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85340000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aef8c r4:853aec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853aef8c r4:85387880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85340000 r8:853878ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387880 r8:80287e08 r7:eb34de60 r6:85387900 r5:85340000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853977c0 INFO: task kworker/1:698:4844 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b424a000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85341800 r8:8538b2ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdff9dfb0 to 0xdff9dff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:85342400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:4850 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb35dd84 r8:00000002 r7:60000113 r6:eb35dd8c r5:85343000 r4:85343000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85343000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397b00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85343000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb029000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853af78c r4:853af400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853af78c r4:85387b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85343000 r8:85387b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387b00 r8:80287e08 r7:eb34de60 r6:85387b80 r5:85343000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: b474a000 dfafb000 00000001 80239b98 7f151000 00000001 r4:dff9ddc0 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:701:4853 blocked for more than 465 seconds. r10:8291a684 r9:eb359d84 r8:00000002 r7:60000113 r6:eb359d8c r5:85343c00 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85343c00 r8:85387c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387c00 r8:80287e08 r7:eb34de60 r6:85387c80 r5:85343c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85397b80 INFO: task kworker/1:701:4853 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b4bfd000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb361d84 r8:00000002 r7:60000113 r6:eb361d8c r5:85344800 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85344800 r8:85387d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r4:00000000 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:703:4856 blocked for more than 465 seconds. [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb099000 r5:853f038c r4:853f0000 r4:85387e00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:4858 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:4858 tgid:4858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb369d84 r8:00000002 r7:60000013 r6:eb369d8c r5:85345400 r4:85345400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85345400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e140 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85345400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f078c r4:853f0400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f078c r4:85387f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85345400 r8:85387f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85387f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85387f00 r8:80287e08 r7:eb361e60 r6:85387f80 r5:85345400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e100 INFO: task kworker/1:704:4858 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b4f2e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:853f0b8c r4:853a2000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535db8c r4:8535d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535db8c r4:8538b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85320000 r8:8538b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538b300 r8:80287e08 r7:eb1b9e60 r6:853a2100 r5:85320000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb375fb0 to 0xeb375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539d680 INFO: task kworker/0:164:4861 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b526b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:853f178c r4:853f1400 r4:853a2180 Exception stack(0xeb379fb0 to 0xeb379ff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:8483ac80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/1:707 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:85331800 r4:85331800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85331800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e980 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85331800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f138c r4:853f1000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f138c r4:853a2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85331800 r8:853a22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2280 r8:80287e08 r7:eb379e60 r6:853a2300 r5:85331800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e580 INFO: task kworker/1:707:4865 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b5acc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:dff9ddc0 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e072b000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b5acc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:4870 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:708 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853c6000 r4:8291a680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8539ea00 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b5acc000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:709:4872 blocked for more than 465 seconds. r5:853c3000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:853f1f8c r4:853a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539eb80 INFO: task kworker/1:709:4872 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b62c7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:710 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ee00 r5:853f238c r4:853f2000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853a2480 r8:80287e08 r7:eb391e60 r6:853a2500 r5:85332400 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b62c7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:85333000 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:853f278c r4:853a2580 r10:00000000 r9:853a2580 r8:80287e08 r7:eb381e60 r6:853a2600 r5:85333000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f2f8c r4:853f2c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f2f8c r4:853a2680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85333c00 r8:853a26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2680 r8:80287e08 r7:eb399e60 r6:853a2700 r5:85333c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb39dfb0 to 0xeb39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9100 INFO: task kworker/1:712:4879 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b653b000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:4880 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853f2b8c r4:853a2780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:4884 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3add84 r8:00000002 r7:60000013 r6:eb3add8c r5:85336000 r4:85336000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85336000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9340 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85336000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3af000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f338c r4:853f3000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f338c r4:853a2980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85336000 r8:853a29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2980 r8:80287e08 r7:eb3a1e60 r6:853a2a00 r5:85336000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3adfb0 to 0xeb3adff8) dfa0: 00000000 00000000 00000000 00000000 r4:853a9240 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 r5:853f3f8c r4:853f3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:717:4887 blocked for more than 466 seconds. r4:85338c00 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a97c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85338c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f3b8c r4:853f3800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853f3b8c r4:853a2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85338c00 r8:853a2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2b80 r8:80287e08 r7:eb3bde60 r6:853a2c00 r5:85338c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9780 INFO: task kworker/1:717:4887 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b9d84 r8:00000002 r7:60000013 r6:eb3b9d8c r5:85339800 r4:85339800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85339800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539eec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85339800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e492b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540078c r4:85400400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540078c r4:853a2c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85339800 r8:853a2cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2c80 r8:80287e08 r7:eb3bde60 r6:853a2d00 r5:85339800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9980 INFO: task kworker/1:718:4890 is blocked on a mutex likely owned by task kworker/1:139:3474. r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:719 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3cdd84 r8:00000002 r7:60000113 r6:eb3cdd8c r5:8533b000 r4:8533b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9e00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8533b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0803000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540038c r4:85400000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540038c r4:853a2d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533b000 r8:853a2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2d80 r8:80287e08 r7:eb3b9e60 r6:853a2e00 r5:8533b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9b80 INFO: task kworker/1:719:4892 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b7965000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8533c800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:8540178c r4:85401400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85400f8c r4:85400c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85400f8c r4:853a2f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c2400 r8:853a2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a2f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a2f80 r8:80287e08 r7:eb3d5e60 r6:8538b580 r5:853c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a9b40 INFO: task kworker/1:721:4897 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b8078000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/0:166:4898 blocked for more than 466 seconds. r5:853c4800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8538b600 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 r5:00001000 r4:dfb17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b84a7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:4902 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:85420000 r4:85420000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85420000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:85402f8c r4:85402c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8538b780 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) INFO: task kworker/1:723:4904 blocked for more than 466 seconds. r4:85421800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r7:ddde2d80 r6:83018200 r5:8540338c r4:853a4080 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850cc480 INFO: task kworker/1:723:4904 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: b8ea4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:4906 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85420c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r5:00001000 r4:eae31000 r5:85401b8c r4:85401800 r7:ddde2d80 r6:83018200 r5:85401b8c r4:853a4100 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 INFO: task kworker/1:725:4908 blocked for more than 466 seconds. r4:85423c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:8483ac80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85423000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 r5:00001000 r4:eae8f000 r5:8540238c r4:85402000 r4:853a4200 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:4911 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:85424800 r4:85424800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85424800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850cc9c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540278c r4:85402400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540278c r4:853a4280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85424800 r8:853a42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4280 r8:80287e08 r7:eb3e9e60 r6:8538ba80 r5:85424800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:4914 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:4914 tgid:4914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85425400 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85402b8c r4:85402800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853a4300 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85426000 r8:853a43ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85426c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85426c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535eb8c r4:8535e800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535eb8c r4:8538bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85426c00 r8:8538bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538bc00 r8:80287e08 r7:eb1b9e60 r6:8538bc80 r5:85426c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438a700 INFO: task kworker/0:168:4918 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: ba5a8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:4923 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:4923 tgid:4923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb421d84 r8:00000002 r7:60000113 r6:eb421d8c r5:85346c00 r4:85346c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85346c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a9ec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85346c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85403f8c r4:85403c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bd8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r9:83018205 r8:84bd8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r7:ddde2d80 r6:83018200 r5:8540438c r4:853a4500 r10:00000000 r9:853a4500 r8:80287e08 r7:eb421e60 r6:8538be00 r5:84bd8000 INFO: task kworker/1:732:4925 is blocked on a mutex likely owned by task kworker/1:139:3474. dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84bd8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bd8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb117000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540478c r4:85404400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540478c r4:853a4580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd8c00 r8:853a45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4580 r8:80287e08 r7:eb425e60 r6:8538be80 r5:84bd8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493b080 INFO: task kworker/1:733:4927 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bad8e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:84bd9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b300 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bd9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85404b8c r4:85404800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85404b8c r4:853a4600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bd9800 r8:853a462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bda400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853a4680 r8:80287e08 r7:eb42de60 r6:8538bf80 r5:84bda400 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bb376000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:4933 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:84bdbc00 r4:84bdbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bdbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b640 r4:00000000 r5:00001000 r4:eb291000 r5:8540538c r4:85405000 r7:ddde2d80 r6:83018200 r5:8540538c r4:853a4700 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:dff9ddc0 r5:00001000 r4:dfb17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb441d84 r8:00000002 r7:60000113 r6:eb441d8c r5:84bdb000 r4:84bdb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bdb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85405b8c r4:85405800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85405b8c r4:853a4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bdb000 r8:853a47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4780 r8:80287e08 r7:eb439e60 r6:84817080 r5:84bdb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493b340 INFO: task kworker/1:737:4935 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bb7da000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdff9dfb0 to 0xdff9dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:84bde000 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb2cb000 r5:8540578c r4:85405400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:dff9ddc0 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:84bdc800 r4:84bdc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bdc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85405f8c r4:85405c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85405f8c r4:853a4880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bdc800 r8:853a48ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4880 r8:80287e08 r7:eb441e60 r6:84817180 r5:84bdc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493b680 INFO: task kworker/1:739:4938 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bb7da000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:740:4940 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:740 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb455d84 r8:00000002 r7:60000013 r6:eb455d8c r5:853d8000 r4:853d8000 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8540638c r4:85406000 r7:ddde2d80 r6:83018200 r5:8540638c r4:853a4900 r10:00000000 r9:853a4900 r8:80287e08 r7:eb44de60 r6:84817200 r5:853d8000 INFO: task kworker/1:740:4940 is blocked on a mutex likely owned by task kworker/1:139:3474. Exception stack(0xdff9dd28 to 0xdff9dd70) [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8533ec00 r4:8291a680 [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8540678c r4:85406400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540678c r4:853a4980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8533ec00 r8:853a49ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4980 r8:80287e08 r7:eb455e60 r6:853a4a00 r5:8533ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb481fb0 to 0xeb481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8493bf40 INFO: task kworker/1:741:4949 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bc8bb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:4950 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb485d84 r8:00000002 r7:60000013 r6:eb485d8c r5:8533bc00 r4:8533bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533bc00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:8541d78c r4:8541d400 r10:61c88647 r9:8533bc00 r8:853a4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:84553b8c r4:84553800 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r4:00000000 r5:85406b8c r4:85406800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8438a200 INFO: task kworker/1:743:4951 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bc8bb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:4952 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb48dd84 r8:00000002 r7:60000113 r6:eb48dd8c r5:8533d400 r4:8533d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8533d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493bd80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8533d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85406f8c r4:85406c00 r10:61c88647 r9:8533d400 r8:853a4cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdff9dfb0 to 0xdff9dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:85338000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952600 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85338000 r8:848172ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817280 r8:80287e08 r7:eb1b9e60 r6:853a4d80 r5:85338000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849524c0 INFO: task kworker/0:169:4953 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bceaa000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:4954 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb495d84 r8:00000002 r7:60000013 r6:eb495d8c r5:85336c00 r4:85336c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85336c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493be80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85336c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8540738c r4:85407000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540738c r4:853a4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85336c00 r8:853a4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a4e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4e00 r8:80287e08 r7:eb485e60 r6:853a4e80 r5:85336c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:dff9ddc0 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:853a4f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a4f00 r8:80287e08 r7:eb485e60 r6:853a4f80 r5:85428c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb49dfb0 to 0xeb49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:843981c0 INFO: task kworker/1:746:4956 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bd41c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:853d8c00 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:853d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:8535f38c r4:8535f000 r7:dddced80 r6:83018000 r5:8535f38c r4:84817300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r5:00001000 r4:dfb17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:853db000 [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952c00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853db000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535fb8c r4:8535f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535fb8c r4:84817400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853db000 r8:8481742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817400 r8:80287e08 r7:eb1b9e60 r6:84817480 r5:853db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849528c0 INFO: task kworker/0:171:4959 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bd41c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:4960 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000113 r6:eb3c9d8c r5:853dbc00 r4:853dbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84952c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaffb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535ff8c r4:8535fc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535ff8c r4:84817500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dbc00 r8:8481752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817500 r8:80287e08 r7:eb4a1e60 r6:84817580 r5:853dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849528c0 INFO: task kworker/0:172:4960 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bd8ba000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 r5:84af538c r4:84af5000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84817600 r8:80287e08 r7:eb3c9e60 r6:84817680 r5:853dd400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdff9dfb0 to 0xdff9dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:853de000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r9:83018005 r8:853de000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:84af578c r4:84af5400 r10:61c88647 r9:853de000 r8:8481772c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bdf00000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:747:4968 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:747 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:85428000 r4:85428000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85428000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84398900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb243000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85407b8c r4:85407800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r5:80050013 r4:80239bb0 r4:dff9ddc0 r5:00001000 r4:dfb17000 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000013 r6:eb4b1d8c r5:8542b000 r4:8542b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493bf00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb157000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545838c r4:85458000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545838c r4:84817800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542b000 r8:8481782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817800 r8:80287e08 r7:eb4a5e60 r6:84ae1100 r5:8542b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84952b00 INFO: task kworker/0:175:4970 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: be67c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:4972 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r5:00001000 r4:eb0ab000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8542bc00 r8:848178ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853d9800 r8:8481792c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb499fb0 to 0xeb499ff8) task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r4:dff9ddc0 r5:00001000 r4:dfb17000 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4976 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:853dec00 r4:853dec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f3c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85458b8c r4:85458800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85458b8c r4:84817a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dec00 r8:84817a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817a00 r8:80287e08 r7:eb499e60 r6:84817a80 r5:853dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4bdfb0 to 0xeb4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490f1c0 INFO: task kworker/0:178:4976 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bf11f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb225000 r5:8545938c r4:85459000 r10:61c88647 r9:8533e000 r8:84817b2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:84839bc0 task:kworker/0:180 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c5d84 r8:00000002 r7:60000013 r6:eb4c5d8c r5:84bdec00 r4:84bdec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bdec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f580 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bdec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85458f8c r4:85458c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85458f8c r4:84817c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bdec00 r8:84817c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817c00 r8:80287e08 r7:eb4c1e60 r6:84817c80 r5:84bdec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c5fb0 to 0xeb4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490f840 INFO: task kworker/0:180:4980 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bf2fb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4982 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84817d00 r8:80287e08 r7:eb4c1e60 r6:84817d80 r5:853da400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:182:4983 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:182 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:853dc800 r4:853dc800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853dc800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490fc00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85459b8c r4:85459800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85459b8c r4:84817e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dc800 r8:84817e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84817e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817e00 r8:80287e08 r7:eb4c9e60 r6:84817e80 r5:853dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4cdfb0 to 0xeb4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490f6c0 INFO: task kworker/0:182:4983 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bf8bf000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85459f8c r4:85459c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8490fcc0 Call trace: r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: bfe74000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:4988 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:4988 tgid:4988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:853e1800 r4:853e1800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e1800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0400000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:748 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492a600 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85407f8c r4:84ae1200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdff9dd28 to 0xdff9dd70) r4:82ac21e4 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:185:4992 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e5d84 r8:00000002 r7:60000113 r6:eb4e5d8c r5:8542ec00 r4:8542ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490ff40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545a38c r4:8545a000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545a38c r4:8438d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542ec00 r8:8438d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d100 r8:80287e08 r7:eb4b9e60 r6:84ae1300 r5:8542ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8490f180 INFO: task kworker/0:185:4992 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0400000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8438d180 r8:80287e08 r7:eb4b9e60 r6:84ae1380 r5:8542d400 task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:4995 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4fdd84 r8:00000002 r7:60000113 r6:eb4fdd8c r5:8542a400 r4:8542a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8542a400 r8:8438d22c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: c0985000 dfafb000 00000001 80239b98 7f151000 00000001 r4:00000000 [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 r4:8542e000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542e000 r4:8291a680 r10:00000000 r9:8438d280 r8:80287e08 r7:eb4b9e60 r6:84ae1480 r5:8542e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb505fb0 to 0xeb505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67180 INFO: task kworker/0:188:4997 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0985000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:4999 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:85430c00 r4:85430c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85430c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b673c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85430c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545b38c r4:8545b000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545b38c r4:8438d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85430c00 r8:8438d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d300 r8:80287e08 r7:eb4b9e60 r6:84ae1500 r5:85430c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67280 INFO: task kworker/0:189:4999 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0f97000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:5001 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:85430000 r4:85430000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85430000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b675c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85430000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb523000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545b78c r4:8545b400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545b78c r4:8438d380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85430000 r8:8438d3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d380 r8:80287e08 r7:eb4b9e60 r6:84ae1580 r5:85430000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67400 INFO: task kworker/0:190:5001 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c0f97000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:5004 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:85431800 r4:85431800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85431800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67840 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85431800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8545bf8c r4:8545bc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8545bf8c r4:8438d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85431800 r8:8438d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d400 r8:80287e08 r7:eb4b9e60 r6:84ae1600 r5:85431800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67500 INFO: task kworker/0:191:5004 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c14d4000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:5005 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:85433c00 r4:85433c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85433c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67a00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85433c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546078c r4:85460400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546078c r4:8438d480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85433c00 r8:8438d4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d480 r8:80287e08 r7:eb539e60 r6:84ae1680 r5:85433c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67640 INFO: task kworker/0:192:5005 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c15ae000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:5007 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:85434800 r4:85434800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85434800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67900 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85434800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb545000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546038c r4:85460000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546038c r4:8438d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85434800 r8:8438d52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d500 r8:80287e08 r7:eb53de60 r6:84ae1700 r5:85434800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67780 INFO: task kworker/0:193:5007 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c15ae000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:5009 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb559d84 r8:00000002 r7:60000013 r6:eb559d8c r5:85433000 r4:85433000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85433000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67b40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85433000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb561000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85460b8c r4:85460800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85460b8c r4:8438d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85433000 r8:8438d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d580 r8:80287e08 r7:eb53de60 r6:84ae1780 r5:85433000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67640 INFO: task kworker/0:194:5009 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c20a3000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:5012 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:5012 tgid:5012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:85435400 r4:85435400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85435400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67d40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85435400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb573000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85460f8c r4:85460c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85460f8c r4:8438d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85435400 r8:8438d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d600 r8:80287e08 r7:eb559e60 r6:84ae1800 r5:85435400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67a40 INFO: task kworker/0:195:5012 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c20a3000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:5014 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:5014 tgid:5014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:85432400 r4:85432400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85432400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84398c40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85432400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb587000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546178c r4:85461400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546178c r4:8438d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85432400 r8:8438d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d680 r8:80287e08 r7:eb571e60 r6:84ae1880 r5:85432400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67c80 INFO: task kworker/0:196:5014 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c20a3000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:5015 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:85436c00 r4:85436c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85436c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b67ec0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85436c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb579000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546138c r4:85461000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546138c r4:8438d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85436c00 r8:8438d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d700 r8:80287e08 r7:eb57de60 r6:84ae1900 r5:85436c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b67c80 INFO: task kworker/0:197:5015 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c20a3000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:198:5018 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:198 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:85429800 r4:85429800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85429800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85429800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546238c r4:85462000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546238c r4:8438d780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85429800 r8:8438d7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d780 r8:80287e08 r7:eb57de60 r6:84ae1980 r5:85429800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84398e00 INFO: task kworker/0:198:5018 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c24d7000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:5019 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:85438000 r4:85438000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f1c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85438000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85461b8c r4:85461800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85461b8c r4:8438d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438000 r8:8438d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d800 r8:80287e08 r7:eb595e60 r6:84ae1a00 r5:85438000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84398e00 INFO: task kworker/0:199:5019 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c29a9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:5022 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:5022 tgid:5022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000113 r6:eb5b1d8c r5:8543a400 r4:8543a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849520c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85461f8c r4:85461c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85461f8c r4:8438d880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543a400 r8:8438d8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d880 r8:80287e08 r7:eb595e60 r6:84ae1a80 r5:8543a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84952200 INFO: task kworker/0:200:5022 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c29a9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:201:5024 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5bdd84 r8:00000002 r7:60000113 r6:eb5bdd8c r5:85438c00 r4:85438c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f1c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85438c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bf000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546278c r4:85462400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546278c r4:8438d900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438c00 r8:8438d92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d900 r8:80287e08 r7:eb595e60 r6:84ae1b00 r5:85438c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f100 INFO: task kworker/0:201:5024 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c2d8d000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:202:5026 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:202 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:85439800 r4:85439800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85439800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f280 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85439800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85462b8c r4:85462800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85462b8c r4:8438d980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85439800 r8:8438d9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438d980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438d980 r8:80287e08 r7:eb5bde60 r6:84ae1b80 r5:85439800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f180 INFO: task kworker/0:202:5026 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c318c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:5027 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000113 r6:eb5d5d8c r5:8543b000 r4:8543b000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543b000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85462f8c r4:85462c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85462f8c r4:8438da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543b000 r8:8438da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438da00 r8:80287e08 r7:eb5cde60 r6:84ae1c00 r5:8543b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f440 INFO: task kworker/0:203:5027 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c318c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5030 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:5030 tgid:5030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:8543c800 r4:8543c800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543c800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f4c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546338c r4:85463000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546338c r4:84ae1c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543c800 r8:84ae1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae1c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae1c80 r8:80287e08 r7:eb485e60 r6:84ae1d00 r5:8543c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8492a340 INFO: task kworker/1:749:5030 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c330c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:5031 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5e1d84 r8:00000002 r7:60000113 r6:eb5e1d8c r5:8543d400 r4:8543d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f1000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546378c r4:85463400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546378c r4:8438da80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543d400 r8:8438daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438da80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438da80 r8:80287e08 r7:eb5d5e60 r6:84ae1d80 r5:8543d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f380 INFO: task kworker/0:204:5031 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c330c000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:5034 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5f5d84 r8:00000002 r7:60000113 r6:eb5f5d8c r5:8543bc00 r4:8543bc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543bc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386500 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541c38c r4:8541c000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541c38c r4:84ae1e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543bc00 r8:84ae1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae1e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae1e00 r8:80287e08 r7:eb485e60 r6:84ae1e80 r5:8543bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8492ae80 INFO: task kworker/1:750:5034 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c3602000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:5036 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:5036 tgid:5036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb609d84 r8:00000002 r7:60000113 r6:eb609d8c r5:8543ec00 r4:8543ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f7c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ff000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85463b8c r4:85463800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85463b8c r4:8438db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543ec00 r8:8438db2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438db00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438db00 r8:80287e08 r7:eb5e1e60 r6:84ae1f00 r5:8543ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f6c0 INFO: task kworker/0:205:5036 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c3602000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:5038 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:854c8000 r4:854c8000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae3200 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85464b8c r4:85464800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85464b8c r4:8438db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c8000 r8:8438dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438db80 r8:80287e08 r7:eb609e60 r6:84ae1f80 r5:854c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f6c0 INFO: task kworker/0:206:5038 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c3602000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:5039 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:854c8c00 r4:854c8c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854c8c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fa00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb605000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85463f8c r4:85463c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85463f8c r4:8438dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854c8c00 r8:8438dc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438dc00 r8:80287e08 r7:eb611e60 r6:85382000 r5:854c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f6c0 INFO: task kworker/0:207:5039 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c3cb6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:5041 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:5041 tgid:5041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:853e2400 r4:853e2400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e2400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fb00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546438c r4:85464000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546438c r4:8438dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e2400 r8:8438dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438dc80 r8:80287e08 r7:eb611e60 r6:8438dd00 r5:853e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f9c0 INFO: task kworker/0:208:5041 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c40cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:5045 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000013 r6:eb62dd8c r5:853e4800 r4:853e4800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e4800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386600 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541c78c r4:8541c400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541c78c r4:85382080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e4800 r8:853820ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382080 r8:80287e08 r7:eb485e60 r6:8438dd80 r5:853e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386780 INFO: task kworker/1:751:5045 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c40cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:5047 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:853e5400 r4:853e5400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e5400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386dc0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae67000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541df8c r4:8541dc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8541df8c r4:8438de00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e5400 r8:8438de2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8438de00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8438de00 r8:80287e08 r7:eb611e60 r6:8438de80 r5:853e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538fc00 INFO: task kworker/0:209:5047 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c40cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5048 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb639d84 r8:00000002 r7:60000013 r6:eb639d8c r5:853e6c00 r4:853e6c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853867c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0799000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541cb8c r4:8541c800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541cb8c r4:85382100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6c00 r8:8538212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382100 r8:80287e08 r7:eb485e60 r6:8438df00 r5:853e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386640 INFO: task kworker/1:752:5048 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c40cb000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5050 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:853e6000 r4:853e6000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386700 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0861000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541cf8c r4:8541cc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541cf8c r4:85382180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6000 r8:853821ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382180 r8:80287e08 r7:eb485e60 r6:8438df80 r5:853e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386a40 INFO: task kworker/1:753:5050 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c46ac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:5052 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:853e0000 r4:853e0000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386a00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5f000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541d38c r4:8541d000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541d38c r4:85382200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0000 r8:8538222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382200 r8:80287e08 r7:eb485e60 r6:8538d000 r5:853e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386b00 INFO: task kworker/1:754:5052 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c46ac000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:755:5054 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:755 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb651d84 r8:00000002 r7:60000013 r6:eb651d8c r5:853e3000 r4:853e3000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492ad00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541e78c r4:8541e400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e78c r4:85382300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3000 r8:8538232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382300 r8:80287e08 r7:eb485e60 r6:8538d080 r5:853e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386c40 INFO: task kworker/1:755:5054 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4804000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5056 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb659d84 r8:00000002 r7:60000013 r6:eb659d8c r5:853e3c00 r4:853e3c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386d00 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541db8c r4:8541d800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541db8c r4:85382280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3c00 r8:853822ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382280 r8:80287e08 r7:eb651e60 r6:8538d100 r5:853e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386bc0 INFO: task kworker/1:756:5056 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4804000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5059 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5059 tgid:5059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb629d84 r8:00000002 r7:60000013 r6:eb629d8c r5:85490000 r4:85490000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85490000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386d80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85490000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae99000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541e38c r4:8541e000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541e38c r4:85382380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85490000 r8:853823ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382380 r8:80287e08 r7:eb651e60 r6:8538d200 r5:85490000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386e40 INFO: task kworker/1:757:5059 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4af2000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:5060 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:85490c00 r4:85490c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85490c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853925c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85490c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2d000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546478c r4:85464400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546478c r4:8538d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85490c00 r8:8538d1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8538d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538d180 r8:80287e08 r7:eb611e60 r6:8538d280 r5:85490c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85392240 INFO: task kworker/0:210:5060 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4ee6000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5062 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb661d84 r8:00000002 r7:60000013 r6:eb661d8c r5:85491800 r4:85491800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85491800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8493b8c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85491800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541ef8c r4:8541ec00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ef8c r4:85382400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85491800 r8:8538242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382400 r8:80287e08 r7:eb651e60 r6:8538d300 r5:85491800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb661fb0 to 0xeb661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386e40 INFO: task kworker/1:758:5062 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4fa9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5065 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5065 tgid:5065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:85492400 r4:85492400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85492400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f400 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85492400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaefd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541eb8c r4:8541e800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541eb8c r4:85382480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85492400 r8:853824ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382480 r8:80287e08 r7:eb661e60 r6:8538d380 r5:85492400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538fbc0 INFO: task kworker/1:759:5065 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c4fa9000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:760:5068 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:760 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:85493000 r4:85493000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85493000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398000 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb119000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541f78c r4:8541f400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541f78c r4:85382500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85493000 r8:8538252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382500 r8:80287e08 r7:eb661e60 r6:8538d400 r5:85493000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538fdc0 INFO: task kworker/1:760:5068 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c56b8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5071 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:85495400 r4:85495400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85495400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853863c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85495400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541f38c r4:8541f000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541f38c r4:85382580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85495400 r8:853825ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382580 r8:80287e08 r7:eb61de60 r6:8538d580 r5:85495400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8492a040 INFO: task kworker/1:761:5071 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c56b8000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5073 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:85496c00 r4:85496c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85496c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398180 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85496c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb145000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541fb8c r4:8541f800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541fb8c r4:85382600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85496c00 r8:8538262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382600 r8:80287e08 r7:eb61de60 r6:8538d600 r5:85496c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853980c0 INFO: task kworker/1:762:5073 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c5bfa000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:763:5075 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:763 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb655d84 r8:00000002 r7:60000013 r6:eb655d8c r5:854cb000 r4:854cb000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cb000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398480 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550038c r4:85500000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550038c r4:85382680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cb000 r8:853826ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382680 r8:80287e08 r7:eb679e60 r6:85382700 r5:854cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398140 INFO: task kworker/1:763:5075 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c5bfa000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5077 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:854cbc00 r4:854cbc00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854cbc00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398240 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c3000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8541ff8c r4:8541fc00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ff8c r4:85382780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854cbc00 r8:853827ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382780 r8:80287e08 r7:eb655e60 r6:85382800 r5:854cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398140 INFO: task kworker/1:764:5077 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c5f3f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:765:5079 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:765 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb689d84 r8:00000002 r7:60000113 r6:eb689d8c r5:84968000 r4:84968000 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84968000 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398540 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e9000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550078c r4:85500400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550078c r4:85382880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968000 r8:853828ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382880 r8:80287e08 r7:eb655e60 r6:8538d680 r5:84968000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398440 INFO: task kworker/1:765:5079 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c5f3f000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5081 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:84969800 r4:84969800 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84969800 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853989c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84969800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f5000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550138c r4:85501000 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550138c r4:85382900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84969800 r8:8538292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382900 r8:80287e08 r7:eb689e60 r6:8538d700 r5:84969800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398580 INFO: task kworker/1:766:5081 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6394000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5082 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5082 tgid:5082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb695d84 r8:00000002 r7:60000113 r6:eb695d8c r5:8496a400 r4:8496a400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496a400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398680 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fd000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85500b8c r4:85500800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85500b8c r4:85382a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496a400 r8:85382a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382a00 r8:80287e08 r7:eb691e60 r6:8538d780 r5:8496a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398800 INFO: task kworker/1:767:5082 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6394000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5084 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:84968c00 r4:84968c00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84968c00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853986c0 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3eb000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85500f8c r4:85500c00 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85500f8c r4:85382a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968c00 r8:85382aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382a80 r8:80287e08 r7:eb691e60 r6:8538d800 r5:84968c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398940 INFO: task kworker/1:768:5084 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5088 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:8496d400 r4:8496d400 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496d400 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398b40 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43b000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8550178c r4:85501400 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8550178c r4:85382b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496d400 r8:85382b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382b00 r8:80287e08 r7:eb6a5e60 r6:8538d900 r5:8496d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853988c0 INFO: task kworker/1:770:5088 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:771:5090 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:771 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a53be8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a52c64>] (__schedule) from [<81a53be8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:8496ec00 r4:8496ec00 [<81a53bbc>] (schedule) from [<81a53fd0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496ec00 r4:8291a680 [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a53fb8>] (schedule_preempt_disabled) from [<81a566b4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a563b4>] (__mutex_lock.constprop.0) from [<81a56b80>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a56b6c>] (__mutex_lock_slowpath) from [<81a56bc0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a56b84>] (mutex_lock) from [<804e77f8>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398c80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb445000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85501b8c r4:85501800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85501b8c r4:85382b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496ec00 r8:85382bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85382b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85382b80 r8:80287e08 r7:eb6a5e60 r6:8538d980 r5:8496ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85398bc0 INFO: task kworker/1:771:5090 is blocked on a mutex likely owned by task kworker/1:139:3474. task:kworker/1:139 state:R running task stack:0 pid:3474 tgid:3474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a52c64>] (__schedule) from [<81a5401c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:848e3c00 r8:80200be4 r7:dff9dd5c r6:ffffffff r5:848e3c00 r4:00000000 [<81a53fdc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdff9dd28 to 0xdff9dd70) dd20: c6a7e000 dfafb000 00000001 80239b98 7f151000 00000001 dd40: 82ac15a0 7f151000 dfafb000 8280c928 82ac21c4 dff9dda4 dff9dda8 dff9dd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75cc>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73bc>] (__purge_vmap_area_lazy) from [<804e7974>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dff9ddc0 r5:dff9de08 r4:dff9ddc0 [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7790>] (_vm_unmap_aliases) from [<804eb6d8>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84839a80 r4:00000000 [<804eb570>] (vfree) from [<8054b14c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b11c>] (execmem_free) from [<803cc270>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc260>] (bpf_jit_free_exec) from [<803cc650>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e8>] (bpf_jit_free) from [<803cd7ac>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84553b8c r4:84553800 [<803cd660>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84553b8c r4:8483ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3c00 r8:8483acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8483ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8483ac80 r8:80287e08 r7:dff95e60 r6:84944a00 r5:848e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff9dfb0 to 0xdff9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84839bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:00050113 r5:60050193 r4:82257d54 [<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<80220048>] (dump_stack) from [<81a3cdcc>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a3cc6c>] (nmi_cpu_backtrace) from [<81a3cf18>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c610 r5:8281af00 r4:ffffffff [<81a3cde8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:0000e6cb r8:82ab6564 r7:8280c788 r6:00007766 r5:8281b4c8 r4:85e1320c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437) [<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:80386900 r7:8329e300 r6:8329e300 r5:832dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8338a0c0 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2819 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a5bfec>] lr : [<80a629ec>] psr: 60050013 sp : ebe09eb0 ip : ebe09ec0 fp : ebe09ebc r10: 8295b3bc r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295b320 r5 : 00000000 r4 : 00000001 r3 : 0000b35d r2 : 00000000 r1 : 60050013 r0 : 83327c40 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 847d9040 DAC: fffffffd Call trace: [<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a5bfc4>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a629cc>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c610 r5:83c78000 r4:8295b320 [<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295b320 r8:802efd8c r7:84252b00 r6:84252b00 r5:83c78000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe09fb0 to 0xebe09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842cbc80